Seite 1 von 20 Ergebnissen

Sortieren nach: Relevanz | Aktualität | Titel

Synonyme wurden verwendet für: Sicherheit

Suche ohne Synonyme: keywords:(Sicherheit)

Verwendete Synonyme:

  • safety
  • security
  • «
  • 1
  1.  

    Sistem Keamanan Berlapis pada Ruangan Menggunakan RFID (Radio Frequency Identification) dan Keypad untuk Membuka Pinta Secara Otomatis

    Freier Zugriff
    Muhammad Chamdun / Adian Fatchur Rochim / Eko Didik Widianto | DOAJ | 2014
    Schlagwörter: Home security, System Security
  2.  

    Sistem Keamanan Berlapis pada Ruangan Menggunakan RFID (Radio Frequency Identification) dan Keypad untuk Membuka Pinta Secara Otomatis

    Freier Zugriff
    Muhammad Chamdun / Adian Fatchur Rochim / Eko Didik Widianto | DOAJ | 2014
    Schlagwörter: Home security, System Security
  3.  

    Efficient Security and Privacy Protection for Emerging Smart RFID Communications

    Freier Zugriff
    Mohammad Fal Sadikin / Marcel Kyas | DOAJ | 2014
    Schlagwörter: Smart RFID Security; Privacy Preserving; Mutual Authentication
  4.  

    Efficient Security and Privacy Protection for Emerging Smart RFID Communications

    Freier Zugriff
    Mohammad Fal Sadikin / Marcel Kyas | DOAJ | 2014
    Schlagwörter: Smart RFID Security; Privacy Preserving; Mutual Authentication
  5.  

    Implementasi Sinkronisasi Waktu dengan Network Time Protocol untuk Pemantauan Keamanan Aktivitas Jaringan Telekomunikasi

    Freier Zugriff
    Ahmad Budi Setiawan | DOAJ | 2017
    Schlagwörter: network security
  6.  

    Sistem Keamanan Sepeda Motor Berbasis Mikrokontroler dan Modul GSM

    Freier Zugriff
    Deri Andesta / Rian Ferdian | DOAJ | 2018
    Schlagwörter: Security, GSM Module, SW420 Vibration Sensor, Voltage Sensor, Android
  7.  

    THE IMPACT OF ECONOMIC COMPANY DATA THEFT

    Freier Zugriff
    Ramona MARGE / Ştefan IOVAN | DOAJ | 2018
    Schlagwörter: cyber security
  8.  

    Trust framework for a secured routing in wireless sensor network

    Freier Zugriff
    Ouassila Hoceini / Saïd Talbi / Rachida Aoudjit | DOAJ | 2015
    Schlagwörter: Security
  9.  

    Kajian Literatur Sinkronisasi Waktu Dengan Network Time Protocol Untuk Pemantauan Aktivitas Jaringan Telekomunikasi

    Freier Zugriff
    Ahmad Budi Setiawan | DOAJ | 2015
    Schlagwörter: network security
  10.  

    Impact of Selected Electrical Cables Slope on Flame Out Time and Flame Spread

    Freier Zugriff
    Nečas Aleš / Martinka Jozef / Wachter Igor et al. | DOAJ | 2019
    Schlagwörter: safety
  11.  

    Smart Grid Security with Cryptographic Chip Integration

    Freier Zugriff
    Adesh Kumar / Priyanshi Vishnoi / Shimi S. L. | DOAJ | 2019
    Schlagwörter: Smart grid security
  12.  

    On the secrecy performance of transmit-receive diversity and spatial multiplexing systems

    Freier Zugriff
    Kiattisak Maichalernnukul | DOAJ | 2019
    Schlagwörter: Physical-layer security
  13.  

    Efficient Key Management System for Large-scale Smart RFID Applications

    Freier Zugriff
    Mohammad Fal Sadikin / Marcel Kyas | DOAJ | 2015
    Schlagwörter: security and privacy
  14.  

    Fault-tolerant and QoS based Network Layer for Security Management

    Freier Zugriff
    Mohamed Naceur Abdelkrim / Ahmed Zouinkhi / Kais Mekki | DOAJ | 2013
    Schlagwörter: Wireless Sensor Networks, Security, Routing protocol, Quality of Service, Fault-tolerant
  15.  

    Review of the false data injection attack against the cyber-physical power system

    Freier Zugriff
    Qi Wang / Wei Tai / Yi Tang et al. | DOAJ | 2019
    Schlagwörter: power system security, security of data
  16.  

    EMS communication routings’ optimisation to enhance power system security considering cyber-physical interdependence

    Freier Zugriff
    Qinglai Guo / Shujun Xin / Luo Xu et al. | DOAJ | 2018
    Schlagwörter: power system security, power system security enhancement
  17.  

    Evropská obranná agentura v šesti letech

    Freier Zugriff
    Vilém KOLÍN | DOAJ | 2010
    Schlagwörter: Common Security and Defence Policy
  18.  

    Entropy-based electricity theft detection in AMI network

    Freier Zugriff
    Sandeep Kumar Singh / Ranjan Bose / Anupam Joshi | DOAJ | 2018
    Schlagwörter: AMI security
  19.  

    FARIMA model-based communication traffic anomaly detection in intelligent electric power substations

    Freier Zugriff
    Qiang Yang / Weijie Hao / Leijiao Ge et al. | DOAJ | 2019
    Schlagwörter: security of data
  20.  

    GPS spoofing effect on phase angle monitoring and control in a real-time digital simulator-based hardware-in-the-loop environment

    Freier Zugriff
    Charalambos Konstantinou / Marios Sazos / Ahmed S. Musleh et al. | DOAJ | 2017
    Schlagwörter: telecommunication security
  • «
  • 1

Ergebnisse anzeigen: 10 | 20 | 50