Year of publication
Type of media
Source
Subject
Type of material
Licence
Language
1–50 of 7,655 hits
Sort by:
Sort by:
-
Real-time anomaly detection systems for Denial-of-Service attacks by weighted k-nearest-neighbor classifiers
Tema Archive | 2011|Keywords: Datensicherheit -
Random effects logistic regression model for anomaly detection
Tema Archive | 2010|Keywords: Datensicherheit -
Selective image encryption in fractional wavelet domain
Tema Archive | 2011|Keywords: Datensicherheit -
Information security incident management: Current practice as reported in the literature
Tema Archive | 2014|Keywords: Datensicherheit -
In-packet bloom filters: Design and networking applications
Tema Archive | 2011|Keywords: Datensicherheit -
An information hiding algorithm based on intra-prediction modes and matrix coding for H.264/AVC video stream
Tema Archive | 2011|Keywords: Datensicherheit -
Security analysis and improvement on a double-random phase-encoding technique based information hiding method
Tema Archive | 2009|Keywords: Datensicherheit -
Future directions for behavioral information security research
Tema Archive | 2013|Keywords: Datensicherheit -
Genetic algorithm-based clustering approach for k-anonymization
Tema Archive | 2009|Keywords: Datensicherheit -
Long-distance quantum communication with atomic ensembles and linear optics
Tema Archive | 2001|Keywords: Datensicherheit -
How to pick the best master data management solution for your organization
Tema Archive | 2009Keywords: Datensicherheit -
Component forensics (theory, methodologies, and applications)
Tema Archive | 2009|Keywords: Datensicherheit -
Priority-aware optical shared protection: an offline evaluation study
Tema Archive | 2009|Keywords: Datensicherheit -
An analysis of distributed sensor data aggregation for network intrusion detection
Tema Archive | 2007|Keywords: Datensicherheit -
Dynamic probabilistic packet marking for efficient IP traceback
Tema Archive | 2007|Keywords: Datensicherheit -
Ein Modell zur dynamischen Investitionsrechnung von IT-Sicherheitsmaßnahmen
Tema Archive | 2007|Keywords: Datensicherheit -
A highly accurate and computationally efficient approach for unconstrained iris segmentation
Tema Archive | 2010|Keywords: Datensicherheit -
Image sharing scheme based on discrete fractional random transform
Tema Archive | 2010|Keywords: Datensicherheit -
Data hiding in scrambled images: A new double layer security data hiding technique
Tema Archive | 2014|Keywords: Datensicherheit -
How Bad Are Selfish Investments in Network Security?
Tema Archive | 2011|Keywords: Datensicherheit -
Partner gesucht? Managed Security-Service auf dem Vormarsch
Tema Archive | 2009|Keywords: Datensicherheit -
Drahtlos Geld los. RFID-Chips in Kreditkarten werfen Sicherheitsfragen auf
Tema Archive | 2007|Keywords: Datensicherheit -
Datenschutz braucht scharfe Instrumente. Beitrag zur Diskussion um "personenbezogene Daten"
Tema Archive | 2008|Keywords: Datensicherheit -
The implications of Sarbanes-Oxley for non-US IT departments
Tema Archive | 2005|Keywords: Datensicherheit -
Löchriger Käse. Sicherheitstest: Verschlüsselte Filesysteme unter Linux
Tema Archive | 2006|Keywords: Datensicherheit -
A flexible H.264/AVC compressed video watermarking scheme using particle swarm optimization based dither modulation
Tema Archive | 2011|Keywords: Datensicherheit -
Joint watermarking and encryption of color images in the Fibonacci-Haar domain
Tema Archive | 2009|Keywords: Datensicherheit -
Heimlich & Co.
13 Virenscanner unter Windows 95 im VergleichIuD Bahn | 1997|Keywords: Datensicherheit -
The synergetic model of the controlling tactics to network financial information security
Tema Archive | 2008|Keywords: Datensicherheit -
Design, analysis, and performance of a noise modulated covert communications system
Tema Archive | 2008|Keywords: Datensicherheit -
Die Mitarbeiter als Firewall. Wie Sicherheitsbewusstsein entsteht
Tema Archive | 2005|Keywords: Datensicherheit -
A clustering-based method for unsupervised intrusion detections
Tema Archive | 2006|Keywords: Datensicherheit -
Das zertifizierte RZ. Herausforderungen in Zeiten von Outsourcing, SaaS und Cloud Computing
Tema Archive | 2010|Keywords: Datensicherheit -
Tool-Verbund für GRC und Sicherheit. Ansatz zur toolunterstützten Steuerung ganzheitlicher Informationssicherheit
Tema Archive | 2009|Keywords: Datensicherheit -
Security solutions for uplink- and downlink-traffic in wireless sensor networks
Tema Archive | 2010|Keywords: Datensicherheit
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions:
full data search
or
title and abstract search
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
TIB AV portal
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
Specialised Information Service for Mobility and Transport Research (FID move)
Open Research Knowledge Graph (ORKG)
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Common Union Catalogue (GVK)
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.