Year of publication
Type of media
Source
Type of material
Licence
Language
101–120 of 411 hits
Sort by:
Sort by:
-
Governance of Information Security: New Paradigm of Security Management
Springer Verlag | 2007|Keywords: Computer Security -
Investigation on Operating Systems Identification by Means of Fractal Geometry and OS Pseudorandom Number Generators
Springer Verlag | 2013|Keywords: Computer security -
Security Analysis in the Architecture of the ATM Service
Springer Verlag | 2022|Keywords: Computer security of ATMs -
Joint detection of malicious domains and infected clients
Springer Verlag | 2019|Keywords: Computer security -
An Investigation of Broken Access Control Types, Vulnerabilities, Protection, and Security
Springer Verlag | 2024|Keywords: Computer security -
A High Efficient Control Flow Authentication Method Basing on Loop Isolation
Springer Verlag | 2018|Keywords: Computer security -
Software System for Users Continuous Identification Based on Behavioral Information About the Work with Standard Input Devices
Springer Verlag | 2019|Keywords: computer security -
A study on stable web server system using virtualization technology against attacks
Springer Verlag | 2014|Keywords: Computer security -
A concurrent solution to computer security
National licenceSpringer Verlag | 1992|Keywords: computer security -
Infringing Key Authentication of an ID-Based Group Key Exchange Protocol Using Binary Key Trees
Springer Verlag | 2007|Keywords: Computer Security Foundation Workshop, IEEE Computer Security Foundation Workshop -
Survey on Intrusion Detection System in IoT Network
Springer Verlag | 2022|Keywords: Computer Security -
Byte Frequency Based Indicators for Crypto-Ransomware Detection from Empirical Analysis
Springer Verlag | 2022|Keywords: computer security -
Where Computer Security Meets National Security1
Springer Verlag | 2005|Keywords: computer security -
Experimenting with masquerade detection via user task usage
Springer Verlag | 2016|Keywords: Computer security -
Password Recovery Mechanism Based on Keystroke Dynamics
Springer Verlag | 2015|Keywords: Computer security -
Noninterference Analysis of Delegation Subterfuge in Distributed Authorization Systems
Free accessSpringer Verlag | 2013|Keywords: Computer Security -
A Taxonomy for Analyzing Hazards to Information Systems
Free accessSpringer Verlag | 1996|Keywords: Computer Security -
Validation of the JavaCard Platform with Implicit Induction Techniques
Springer Verlag | 2003|Keywords: Computer Security Foundation Workshop -
Discovery and Dissemination of Discovering Security Vulnerabilities
Springer Verlag | 2013|Keywords: Computer Security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions:
full data search
or
title and abstract search
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
TIB AV portal
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
Specialised Information Service for Mobility and Transport Research (FID move)
Open Research Knowledge Graph (ORKG)
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Common Union Catalogue (GVK)
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.