Year of publication
Type of media
Type of material
Licence
Language
41–60 of 370 hits
Sort by:
Sort by:
-
A chaos-based keyed hash function based on fixed point representation
Online Contents | 2018|Keywords: Security evaluation -
Sensitivity Analysis of a Baysian Network Model on PCM Equipments
National licenceTrans Tech Publications | 2013|Keywords: Security Evaluation -
A chaos-based keyed hash function based on fixed point representation
Online Contents | 2018|Keywords: Security evaluation -
A novel approach to evaluate software vulnerability prioritization
Elsevier | 2013|Keywords: Security evaluation -
Novel efficient techniques for real-time cloud security assessment
Elsevier | 2016|Keywords: Security evaluation -
The Study on Network Security Strategy Based on Security Evaluation
National licenceTrans Tech Publications | 2013|Keywords: Security Evaluation -
A game theoretic framework for evaluation of the impacts of hackers diversity on security measures
Elsevier | 2011|Keywords: Quantitative security evaluation -
Generating attack scenarios for the system security validation
Online Contents | 2012|Keywords: security evaluation -
A hybrid ranking approach to estimate vulnerability for dynamic attacks
Elsevier | 2011|Keywords: Security evaluation -
Generating attack scenarios for the system security validation
Online Contents | 2012|Keywords: security evaluation -
Urban ecological security evaluation and spatial correlation research-----based on data analysis of 16 cities in Hubei Province of China
Elsevier | 2021|Keywords: Ecological security evaluation -
A High Performance Fingerprint Liveness Detection Method Based on Quality Related Features
Free accessBASE | 2012|Keywords: Security evaluation -
Simulation and Evaluation of China’s Natural Gas Resource Security Evolution Trajectory Based on PSR Model
National licenceTrans Tech Publications | 2014|Keywords: Security Evaluation -
Antibacterial Effect and Security Evaluation on Nano-Hydroxyapatite Bearing Cu2+ and Zn2+
National licenceTrans Tech Publications | 2006|Keywords: Security Evaluation -
Land ecological security assessment for Yancheng city based on catastrophe theory
Free accessDOAJ | 2014|Keywords: Land ecological security evaluation -
Quantifying the attack surface of a web application
Free accessFraunhofer Publica | 2010|Keywords: security evaluation -
Measuring IDS-estimated attack impacts for rational incident response: A decision theoretic approach
Elsevier | 2009|Keywords: Security evaluation -
Climate protection and China’s energy security: Win–win or tradeoff
Elsevier | 2011|Keywords: Energy security evaluation indicator
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions:
full data search
or
title and abstract search
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
TIB AV portal
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
Specialised Information Service for Mobility and Transport Research (FID move)
Open Research Knowledge Graph (ORKG)
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Common Union Catalogue (GVK)
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.