Year of publication
Type of media
Source
Type of material
Licence
Language
21–40 of 360 hits
Sort by:
Sort by:
-
Applied parallel coordinates for logs and network traffic attack analysis
Springer Verlag | 2009|Keywords: Computer security -
Attacks Against Artificial Intelligence Systems: Classification, The Threat Model and the Approach to Protection
Springer Verlag | 2022|Keywords: Computer security -
Personality Traits as Predictors for Social Engineering Vulnerability
Springer Verlag | 2023|Keywords: computer security -
DOS-Resistant Authentication with Client Puzzles
Springer Verlag | 2001|Keywords: Computer Security Foundation Workshop, IEEE Computer Security Foundation Workshop, 12th IEEE Computer Security Foundation -
Polar differential power attacks and evaluation
Springer Verlag | 2012|Keywords: computer security -
Fundamental Concepts of Modeling Computer Security in Cyberphysical Systems
Springer Verlag | 2022|Keywords: Computer security -
Peer Online Training (POT) as Learning Activity in Computer Security Audit and Risks Management Teaching Module
Springer Verlag | 2023|Keywords: Computer Security Audit -
An Immunity Inspired Anomaly Detection System: A General Framework
Springer Verlag | 2012|Keywords: Computer security -
Zero Knowledge Password Authentication Protocol
Springer Verlag | 2013|Keywords: computer security -
Providing security for automated process control systems at hydropower engineering facilities
Springer Verlag | 2016|Keywords: computer security -
Improving the Detection Accuracy of Unknown Malware by Partitioning the Executables in Groups
Springer Verlag | 2016|Keywords: Computer security -
Computer Security, Importance and Scope in Organizations
Springer Verlag | 2023|Keywords: Computer security -
Transfusion of Extended Vigenere Table and ASCII Conversion for Encryption Contrivance
Springer Verlag | 2019|Keywords: Computer security -
The Analysis of Firewall Policy Through Machine Learning and Data Mining
Springer Verlag | 2017|Keywords: Computer security -
Game Theory as a Method for Assessing the Security of Database Systems
Springer Verlag | 2023|Keywords: Computer security -
Performance Evaluation of System Resources Utilization with Sandboxing Applications
Springer Verlag | 2015|Keywords: Computer Security -
Intelligence Techniques in Computer Security and Forensics: At the Boundaries of Ethics and Law
Springer Verlag | 2012|Keywords: Computer Security -
A Dedicated Undergraduate Track in Computer Security Education
Springer Verlag | 2012|Keywords: Undergraduate Computer Security Education, Computer Security Case Studies -
Overview of Vulnerabilities of Decision Support Interfaces Based on Virtual and Augmented Reality Technologies
Springer Verlag | 2021|Keywords: Computer security -
Profiled Attacks Against the Elliptic Curve Scalar Point Multiplication Using Neural Networks
Springer Verlag | 2022|Keywords: Computer security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions:
full data search
or
title and abstract search
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
TIB AV portal
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
Specialised Information Service for Mobility and Transport Research (FID move)
Open Research Knowledge Graph (ORKG)
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Common Union Catalogue (GVK)
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.