Seite 1 von 49.863 Ergebnissen

Sortieren nach: Relevanz | Aktualität | Titel

Treffer filtern

Externe Quellen

Suchen...

Synonyme wurden verwendet für: Sicherheit

Suche ohne Synonyme: keywords:(Sicherheit)

Verwendete Synonyme:

  • safety
  • security
  1.  

    Information security management in SOCs and SICs

    Miloslavskaya, Natalia | IOS Press | 2018
    Schlagwörter: Information security, information security incident, information security management, Security Operations Center, Security Intelligence Center
  2.  

    Load Shedding in Data Stream Management Systems Using Application Semantics

    Adaikkalavan, R. | British Library Conference Proceedings | 2012
    Schlagwörter: Database security, Data security, Security data
  3.  

    EXPLORE: A Novel Decision Tree Classification Algorithm

    Islam, M.Z. | British Library Conference Proceedings | 2012
    Schlagwörter: Database security, Data security, Security data
  4.  

    Whither BNCOD and the UK Database Community

    Jeffery, K.G. | British Library Conference Proceedings | 2012
    Schlagwörter: Database security, Data security, Security data
  5.  

    Uses of Peer Assessment in Database Teaching and Learning

    Paterson, J. / Wilson, J.N. / Leimich, P. | British Library Conference Proceedings | 2012
    Schlagwörter: Database security, Data security, Security data
  6.  

    Issues of Flash-Aware Buffer Management for Database Systems

    Ou, Y. / Harder, T. | British Library Conference Proceedings | 2012
    Schlagwörter: Database security, Data security, Security data
  7.  

    Test Data Provisioning for Database-Driven Applications

    Haller, K. | British Library Conference Proceedings | 2012
    Schlagwörter: Database security, Data security, Security data
  8.  

    Efficient Model Selection for Large-Scale Nearest-Neighbor Data Mining

    Hamerly, G. / Speegle, G. | British Library Conference Proceedings | 2012
    Schlagwörter: Database security, Data security, Security data
  9.  

    An Efficient Approach to Mine Rare Association Rules Using Maximum Items' Support Constraints

    Kiran, R.U. / Reddy, P.K. | British Library Conference Proceedings | 2012
    Schlagwörter: Database security, Data security, Security data
  10.  

    Whither BNCOD? The Future of Database and Information Systems Research

    Gray, A.J.G. | British Library Conference Proceedings | 2012
    Schlagwörter: Database security, Data security, Security data
  11.  

    ``Valuing'' Privacy While Exposing Data Utility

    Barker, K. | British Library Conference Proceedings | 2012
    Schlagwörter: Database security, Data security, Security data
  12.  

    Uncertainty in Sequential Pattern Mining

    Muzammal, M. / Raman, R. | British Library Conference Proceedings | 2012
    Schlagwörter: Database security, Data security, Security data
  13.  

    Comparing the Performance of Object and Object Relational Database Systems on Objects of Varying Complexity

    Kalantari, R. / Bryant, C.H. | British Library Conference Proceedings | 2012
    Schlagwörter: Database security, Data security, Security data
  14.  

    Privacy Supporting Cloud Computing: ConfiChair, a Case Study

    Arapinis, M. / Bursuc, S. / Ryan, M. | British Library Conference Proceedings | 2012
    Schlagwörter: Computer security, Security
  15.  

    Data and Applications Security: Past, Present and the Future

    Thuraisingham, B. | British Library Conference Proceedings
    Schlagwörter: Database security, Applications security
  16.  

    Persistent versus Dynamic Role Membership

    Bacon, J. / Chadwick, D. W. / Otenko, O. et al. | British Library Conference Proceedings
    Schlagwörter: Database security, Applications security
  17.  

    Systematic Development of a Family of Fair Exchange Protocols

    Ezhilchelvan, P. D. / Shrivastava, S. K. | British Library Conference Proceedings
    Schlagwörter: Database security, Applications security
  18.  

    Secure Authorisation for Web Services

    Indrakanti, S. / Varadharajan, V. / Hitchens, M. et al. | British Library Conference Proceedings
    Schlagwörter: Database security, Applications security
  19.  

    Administration Rights in the SDSD-System

    Biskup, J. / Leineweber, T. / Parthe, J. | British Library Conference Proceedings
    Schlagwörter: Database security, Applications security
  20.  

    Adapting Query Optimization Techniques for Efficient Alert Correlation

    Ning, P. / Xu, D. | British Library Conference Proceedings
    Schlagwörter: Database security, Applications security

Ergebnisse anzeigen: 10 | 20 | 50