Year of publication
Source
Subject
Type of material
Licence
1–20 of 1,398 hits
Sort by:
Sort by:
-
Invisible Security Ink Based on Water‐Soluble Graphitic Carbon Nitride Quantum Dots
Wiley | 2016|Keywords: Datensicherheit -
Real-time anomaly detection systems for Denial-of-Service attacks by weighted k-nearest-neighbor classifiers
Tema Archive | 2011|Keywords: Datensicherheit -
Random effects logistic regression model for anomaly detection
Tema Archive | 2010|Keywords: Datensicherheit -
Reversible Response of Luminescent Terbium(III)–Nanocellulose Hydrogels to Anions for Latent Fingerprint Detection and Encryption
Wiley | 2018|Keywords: Datensicherheit -
Selective image encryption in fractional wavelet domain
Tema Archive | 2011|Keywords: Datensicherheit -
In-packet bloom filters: Design and networking applications
Tema Archive | 2011|Keywords: Datensicherheit -
Information security incident management: Current practice as reported in the literature
Tema Archive | 2014|Keywords: Datensicherheit -
An information hiding algorithm based on intra-prediction modes and matrix coding for H.264/AVC video stream
Tema Archive | 2011|Keywords: Datensicherheit -
False positive reduction in intrusion detection system: a survey
Tema Archive | 2009|Keywords: Datensicherheit -
A technique for detecting new attacks in low-interaction honeypot traffic
Tema Archive | 2009|Keywords: Datensicherheit -
Security analysis and improvement on a double-random phase-encoding technique based information hiding method
Tema Archive | 2009|Keywords: Datensicherheit -
Compressing Attack Graphs Through Reference Encoding
Tema Archive | 2010|Keywords: Datensicherheit -
Building lightweight intrusion detection system based on principal component analysis and C4.5 algorithm
Tema Archive | 2007|Keywords: Datensicherheit -
Long-distance quantum communication with atomic ensembles and linear optics
Tema Archive | 2001|Keywords: Datensicherheit -
Network anomaly detection using dissimilarity-based one-class SVM classifier
Tema Archive | 2009|Keywords: Datensicherheit -
Component forensics (theory, methodologies, and applications)
Tema Archive | 2009|Keywords: Datensicherheit -
Privacy-preserving Clone Detection for RFID-enabled Supply Chains
Tema Archive | 2010|Keywords: Datensicherheit -
Priority-aware optical shared protection: an offline evaluation study
Tema Archive | 2009|Keywords: Datensicherheit
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions:
full data search
or
title and abstract search
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
TIB AV portal
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
Specialised Information Service for Mobility and Transport Research (FID move)
Open Research Knowledge Graph (ORKG)
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Common Union Catalogue (GVK)
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.