Year of publication
Type of media
Source
Subject
Type of material
Licence
Language
151–200 of 730 hits
Sort by:
Sort by:
-
Full-field optical coherence tomography and its application to multiple-layer 2D information retrieving
Tema Archive | 2005|Keywords: Datensicherheit -
An anomaly detection technique based on a chi-square statistic for detecting intrusions into information systems
Tema Archive | 2001|Keywords: Datensicherheit -
Wer Malloc sagt, muss auch Free sagen
Echtzeitfähiges Messagesystem mit integrierten SicherheitsfunktionenIuD Bahn | 2004|Keywords: Datensicherheit -
User identification based on finger-vein patterns for consumer electronics devices
Tema Archive | 2010|Keywords: Datensicherheit -
Umfassende Absicherung gegen unberechtigte Zugriffe. Prozessleitsystem PVSS
Tema Archive | 2008|Keywords: Datensicherheit -
Watermark embedding: hiding a signal within a cover image
Tema Archive | 2001|Keywords: Datensicherheit -
Anomaly detection in TCP/IP networks using immune systems paradigm
Tema Archive | 2007|Keywords: Datensicherheit -
Schneller Datenaustausch mit intelligenten Formularen
Product Lifecycle ManagementIuD Bahn | 2009|Keywords: Datensicherheit -
A new decoder for the optimum recovery of nonadditive watermarks
Tema Archive | 2001|Keywords: Datensicherheit -
Detecting and tracing DDoS attacks in the traffic analysis using auto regressive model
Tema Archive | 2004|Keywords: Datensicherheit -
Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection
Tema Archive | 2007|Keywords: Datensicherheit -
Unbesorgt plaudern. Sicherheitsstrategie für IP-Telefonie in Büro und Verwaltung
Tema Archive | 2005|Keywords: Datensicherheit -
Security in SCADA systems: how to handle the growing menace to process automation
Tema Archive | 2005|Keywords: Datensicherheit -
Image encryption based on the random rotation operation in the fractional Fourier transform domains
Tema Archive | 2012|Keywords: Datensicherheit -
Analysis and optimization of Kumar-Rajagopalan-Sahai coding constructions for blacklisting problem
Tema Archive | 2001|Keywords: Datensicherheit -
IT-Sicherheit in der Energieversorgung. Erweiterung von Abnahmetests um IT-Sicherheit im Smart Grid
Tema Archive | 2013|Keywords: Datensicherheit -
Design in probing on high-speed buses to improve debugging
Tema Archive | 2002|Keywords: Datensicherheit -
An optimal decision method for establishment of security objectives
Tema Archive | 2000|Keywords: Datensicherheit -
Weit mehr als nur Papier gespart. Elektronische Lösungen ersetzen den Kalibrierschein
Tema Archive | 2000|Keywords: Datensicherheit -
SCAN: A secure service directory for service-centric wireless sensor networks
Tema Archive | 2005|Keywords: Datensicherheit -
Anomaly detection in radiation sensor data with application to transportation security
Tema Archive | 2009|Keywords: Datensicherheit -
Produktionsstillstand vorbeugen. Business Continuity Management bereitet auf Notfälle vor
Tema Archive | 2005|Keywords: Datensicherheit -
Sichere Kommunikation für eingebettete Systeme mit Strukturierten Komponenten
Tema Archive | 2006|Keywords: Datensicherheit -
A security of a watermarking for copyright protection using wavelet transform
Tema Archive | 1997|Keywords: Datensicherheit -
Creating a Virtual Personal Health Record Using Mashups
Tema Archive | 2011|Keywords: Datensicherheit -
Robust data compression: consistency checking in the synchronization of variable length codes
Tema Archive | 2004|Keywords: Datensicherheit -
A database system for comparative genomic hybridization analysis
Tema Archive | 2001|Keywords: Datensicherheit -
A computer-assisted data collection system for use in a multicenter study of American Indians and Alaska natives: SCAPES
Tema Archive | 2008|Keywords: Datensicherheit -
Consideration on combinatorial optimization of illegal copy countermeasures
Tema Archive | 2002|Keywords: Datensicherheit -
Anmerkungen zur Kryptoanalyse der Ruland/Schweitzer-Signatur von Bitströmen
Tema Archive | 2001|Keywords: Datensicherheit -
Reversible watermarking algorithm with distortion compensation
Tema Archive | 2010|Keywords: Datensicherheit -
Sicherheit durch Verschlüsselung in optischen Netzen
Tema Archive | 2010|Keywords: Datensicherheit -
Von der Pipeline bis zum Fließband. Integrale Sicherheitskonzepte für die Industrie
Tema Archive | 2006|Keywords: Datensicherheit -
Conversion methods for symbolic features: a comparison applied to an intrusion detection problem
Tema Archive | 2009|Keywords: Datensicherheit -
20-Byte-Speicher mit MO-Technik. Near Field Recording: Olympus kooperiert mit Terastor
Tema Archive | 1997Keywords: Datensicherheit
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions:
full data search
or
title and abstract search
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
TIB AV portal
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
Specialised Information Service for Mobility and Transport Research (FID move)
Open Research Knowledge Graph (ORKG)
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Common Union Catalogue (GVK)
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.