Year of publication
Type of media
Source
Type of material
Licence
Language
121–140 of 411 hits
Sort by:
Sort by:
-
URSID: Automatically Refining a Single Attack Scenario into Multiple Cyber Range Architectures
Springer Verlag | 2024|Keywords: Computer security -
Estimating the Cost of Cybersecurity Activities with CAsPeA: A Case Study and Comparative Analysis
Springer Verlag | 2020|Keywords: Computer security -
Deep learning based cyber bullying early detection using distributed denial of service flow
Springer Verlag | 2022|Keywords: Computer security -
Epistemological Justification for the Offer of the Master's Degree in Information Security in Ecuador
Springer Verlag | 2023|Keywords: Computer security -
Program synthesis for interactive-security systems
Springer Verlag | 2017|Keywords: Computer security -
Data Security in Cloud Computing Using a Hybrid Algorithm Approach
Springer Verlag | 2022|Keywords: Computer security -
Graphical Password Authentication Using Cued Click Points
Free accessSpringer Verlag | 2007|Keywords: Computer Security -
Data warehousing and data mining techniques for intrusion detection systems
Springer Verlag | 2006|Keywords: Computer security -
Reducing Equational Theories for the Decision of Static Equivalence
Springer Verlag | 2010|Keywords: Computer security -
Keystroke Dynamics and Face Image Fusion as a Method of Identification Accuracy Improvement
Springer Verlag | 2017|Keywords: Computer security -
Cryptographic Protocol Analysis on Real C Code
Springer Verlag | 2005|Keywords: IEEE Computer Security Foundation Workshop -
New Security Paradigms: Orthodoxy and Heresy
Free accessSpringer Verlag | 1996|Keywords: Computer Security -
Specialized CSIRT for Incident Response Management in Smart Grids
Springer Verlag | 2018|Keywords: Computer security -
Network Intrusion Detection by Combining One-Class Classifiers
Free accessSpringer Verlag | 2005|Keywords: Computer Security -
Energy Efficient and Secure Scheme Based Compressive Sensing Method for Internet of Vehicles
Springer Verlag | 2023|Keywords: Computer Security -
Combating Cyber Dependent Crimes: The Legal Framework in the UK
Springer Verlag | 2016|Keywords: Computer security -
Web-Based Tutoring System for Computer Security
Springer Verlag | 2002|Keywords: Computer Security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions:
full data search
or
title and abstract search
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
TIB AV portal
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
Specialised Information Service for Mobility and Transport Research (FID move)
Open Research Knowledge Graph (ORKG)
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Common Union Catalogue (GVK)
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.