Year of publication
Source
Subject
Type of material
Licence
201–250 of 1,398 hits
Sort by:
Sort by:
-
Content-Based Detection and Prevention of Spam over IP Telephony - System Design, Prototype and First Results
Tema Archive | 2011|Keywords: Datensicherheit -
Sequential hashing: A flexible approach for unveiling significant patterns in high speed networks
Tema Archive | 2010|Keywords: Datensicherheit -
Quantum cryptography over underground optical fibers
Tema Archive | 1996|Keywords: Datensicherheit -
Bluetooth-Sicherheit: Wie viel Persönlichkeit gebe ich preis?
Bluetooth-SicherheitIuD Bahn | 2004|Keywords: Datensicherheit -
The Implementation with the Network Data Security on the Secure Desktop
Tema Archive | 2013|Keywords: Datensicherheit -
A secure, fault-tolerant and progressive image transmission method using embedded shadows
Tema Archive | 2007|Keywords: Datensicherheit -
The video watermarking container: efficient real-time transaction watermarking
Tema Archive | 2008|Keywords: Datensicherheit -
Inpainting attacks against visible watermarking schemes
Tema Archive | 2001|Keywords: Datensicherheit -
Modelling intrusion detection as an allocation problem
Tema Archive | 2009|Keywords: Datensicherheit -
Fast optimum decoding for non-additive readable watermarking
Tema Archive | 2001|Keywords: Datensicherheit -
Faser server-aided secret computation protocols for modular exponentiation
Tema Archive | 1993|Keywords: Datensicherheit -
Individuell geht's schnell. Sicherer Datenaustausch mit kurzer Reaktionszeit
Tema Archive | 2006|Keywords: Datensicherheit -
A latent class modeling approach to detect network intrusion
Tema Archive | 2006|Keywords: Datensicherheit -
Robust steganography using bit plane complexity segmentation
Tema Archive | 2004|Keywords: Datensicherheit -
Secure Coding als Bindeglied zwischen formalen Ansätzen, um Safety in Infrastruktur-kritischen Systemen zu gewährleisten
Tema Archive | 2008|Keywords: Datensicherheit -
Encrypting the compressed image by chaotic map and arithmetic coding
Tema Archive | 2014|Keywords: Datensicherheit -
Minimax probability machine classifier with feature extraction by kernel PCA for intrusion detection
Tema Archive | 2008|Keywords: Datensicherheit -
Evolutionary optimization of a fuzzy rule-based network intrusion detection system
Tema Archive | 2010|Keywords: Datensicherheit -
Using KPCA feature selection and fusion for intrusion detection
Tema Archive | 2010|Keywords: Datensicherheit -
Improved Internet traffic analysis via optimized sampling
Tema Archive | 2010|Keywords: Datensicherheit -
Identifying High-Rate Flows Based on Sequential Sampling
Tema Archive | 2010|Keywords: Datensicherheit -
Toward automated anomaly identification in large-scale systems
Tema Archive | 2010|Keywords: Datensicherheit -
Time-scale invariant audio watermarking based on the statistical features in time domain
Tema Archive | 2007|Keywords: Datensicherheit -
Reliably executing tasks in the presence of untrusted entities
Tema Archive | 2006|Keywords: Datensicherheit -
A lightweight secure protocol for wireless sensor networks
Tema Archive | 2006|Keywords: Datensicherheit -
Network intrusion detection using CFAR abrupt-change detectors
Tema Archive | 2008|Keywords: Datensicherheit -
A robust on-demand path-key establishment framework via random key predistribution for wireless sensor networks
Tema Archive | 2006|Keywords: Datensicherheit -
Video watermarking by using geometric warping without visible artifacts
Tema Archive | 2007|Keywords: Datensicherheit -
Internationale Erfahrungen mit Smart Metering - Lehren für die Schweiz. Mögliche Rollen- und Aufgabenverteilung im Smart Grid
Tema Archive | 2010|Keywords: Datensicherheit -
IT-Security für Automatisierungs- und leittechnische Anwendungen. Vermeidung von Angriffspunkten und Schwachstellen in Automatisierungs- und leittechnischen Anwendungen
Tema Archive | 2005|Keywords: Datensicherheit -
Design and analysis of password-based key derivation functions
Tema Archive | 2005|Keywords: Datensicherheit -
Zur Sicherheit von SHA-1. Tragweite und Konsequenzen - ein aktueller Überblick
Tema Archive | 2005|Keywords: Datensicherheit -
StirMark Benchmark: audio watermarking attacks based on lossy compression
Tema Archive | 2002|Keywords: Datensicherheit -
Sicherer Transfer von Patientendaten durch Bluetooth eine Realität?
Tema Archive | 2007|Keywords: Datensicherheit -
An LPV approximation for admission control of an internet web server: Identification and control
Tema Archive | 2007|Keywords: Datensicherheit -
Schutzengel für USVs. Fernüberwachung erhöht die Verfügbarkeit
Tema Archive | 2008Keywords: Datensicherheit -
Feine Linien. Wie leicht sich Fingerabdrucksensoren austricksen lassen
Tema Archive | 2007|Keywords: Datensicherheit -
Parallel programmable Ethernet controllers: performance and security
Tema Archive | 2007|Keywords: Datensicherheit
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions:
full data search
or
title and abstract search
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
TIB AV portal
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
Specialised Information Service for Mobility and Transport Research (FID move)
Open Research Knowledge Graph (ORKG)
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Common Union Catalogue (GVK)
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.