Year of publication
Type of media
Source
Type of material
Licence
Language
1–20 of 411 hits
Sort by:
Sort by:
-
Efficient Detect Scheme of Botnet Command and Control Communication
Springer Verlag | 2012|Keywords: Computer Security -
A New Encryption Scheme Method (ESM) Using Capsulated-Layers Conception for Verified QR-Tag for IoT-Based Smart Access Systems
Springer Verlag | 2018|Keywords: Computer security -
Unified and integrated authentication and key agreement scheme for e-governance system without verification table
Springer Verlag | 2019|Keywords: computer security -
Graph embedding as a new approach for unknown malware detection
Springer Verlag | 2016|Keywords: Computer security -
Attack on Students’ Passwords, Findings and Recommendations
Springer Verlag | 2019|Keywords: Computer security -
Guidelines and Their Challenges in Implementing CSIRT in Ecuador
Springer Verlag | 2020|Keywords: Computer security -
OPEM: A Static-Dynamic Approach for Machine-Learning-Based Malware Detection
Springer Verlag | 2013|Keywords: computer security -
Detection and classification of malicious software utilizing Max-Flows between system-call groups
Springer Verlag | 2023|Keywords: Computer security -
A Framework to Create a Virtual Cyber Battlefield for Cyber Maneuvers and Impact Assessment
Springer Verlag | 2019|Keywords: Computer security -
Immunizing Files Against Ransomware with Koalafied Immunity
Springer Verlag | 2022|Keywords: Computer security -
How to detect the Cuckoo Sandbox and to Strengthen it?
Springer Verlag | 2014|Keywords: Computer security -
A Comprehensive Undergraduate Information Assurance Program
Springer Verlag | 2012|Keywords: Computer Security Education, Computer Security -
An Efficient Detection of Malware by Naive Bayes Classifier Using GPGPU
Springer Verlag | 2019|Keywords: Computer security -
Large Scale Attack on Gravatars from Stack Overflow
Springer Verlag | 2020|Keywords: Computer security -
Telling Computer and Human Apart: Image-Sound Based CAPTCHA System
Springer Verlag | 2017|Keywords: Computer security -
Demand and Employability for the Career of Engineering in Computer Security
Springer Verlag | 2022|Keywords: Computer security -
Analysis of Influencing Factors and Countermeasures of Computer Network Security
Springer Verlag | 2020|Keywords: Computer security -
New Cryptography and Computer Security Teaching Methods Using Network Technologies
Springer Verlag | 2017|Keywords: computer security -
Graphical password: prevent shoulder-surfing attack using digraph substitution rules
Springer Verlag | 2017|Keywords: data and computer security -
Applied parallel coordinates for logs and network traffic attack analysis
Springer Verlag | 2009|Keywords: Computer security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions:
full data search
or
title and abstract search
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
TIB AV portal
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
Specialised Information Service for Mobility and Transport Research (FID move)
Open Research Knowledge Graph (ORKG)
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Common Union Catalogue (GVK)
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.