Year of publication
Type of media
Source
Type of material
Licence
Language
61–80 of 411 hits
Sort by:
Sort by:
-
Design and Development of an Efficient Malware Detection Using ML
Springer Verlag | 2020|Keywords: Computer security -
A Comparative Study of Adversarial Attacks to Malware Detectors Based on Deep Learning
Springer Verlag | 2020|Keywords: Computer security -
Estimating the Cost of Cybersecurity Activities with CAsPeA: A Case Study and Comparative Analysis
Springer Verlag | 2020|Keywords: Computer security -
Countering Cyberattacks During Information Operations
Springer Verlag | 2020|Keywords: Computer security -
A Calculus of Chaos in Stochastic Compilation
Engineering in the Cause of MathematicsSpringer Verlag | 2020|Keywords: Computer security -
Self-Sovereign Identity Systems
Evaluation FrameworkSpringer Verlag | 2020|Keywords: Computer security -
Decepticon: A Hidden Markov Model Approach to Counter Advanced Persistent Threats
Springer Verlag | 2020|Keywords: Computer security -
Unified and integrated authentication and key agreement scheme for e-governance system without verification table
Springer Verlag | 2019|Keywords: computer security -
Attack on Students’ Passwords, Findings and Recommendations
Springer Verlag | 2019|Keywords: Computer security -
A Framework to Create a Virtual Cyber Battlefield for Cyber Maneuvers and Impact Assessment
Springer Verlag | 2019|Keywords: Computer security -
An Efficient Detection of Malware by Naive Bayes Classifier Using GPGPU
Springer Verlag | 2019|Keywords: Computer security -
Transfusion of Extended Vigenere Table and ASCII Conversion for Encryption Contrivance
Springer Verlag | 2019|Keywords: Computer security -
Information Systems Architecture and Technology Security Aspects Relating to the Usability Attributes and Evaluation Methods of Mobile Commerce Websites
Springer Verlag | 2019|Keywords: Computer security systems -
Clustering of Malicious Executable Files Based on the Sequence Analysis of System Calls
Springer Verlag | 2019|Keywords: computer security -
Joint detection of malicious domains and infected clients
Springer Verlag | 2019|Keywords: Computer security -
Software System for Users Continuous Identification Based on Behavioral Information About the Work with Standard Input Devices
Springer Verlag | 2019|Keywords: computer security -
Understanding user passwords through password prefix and postfix (P3) graph analysis and visualization
Springer Verlag | 2019|Keywords: Computer security -
Investigating Visualisation Techniques for Rapid Triage of Digital Forensic Evidence
Springer Verlag | 2019|Keywords: Computer security -
The Relationship Between Usability and Biometric Authentication in Mobile Phones
Springer Verlag | 2019|Keywords: Computer security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions:
full data search
or
title and abstract search
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
TIB AV portal
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
Specialised Information Service for Mobility and Transport Research (FID move)
Open Research Knowledge Graph (ORKG)
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Common Union Catalogue (GVK)
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.