Suchergebnisse
UB Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Gefunden in
Schlagwort
- business 6 Treffer
- business.industry 6 Treffer
- software 4 Treffer
- software bug 4 Treffer
- software security assurance 4 Treffer
-
45 weitere Werte:
- 01 natural sciences 3 Treffer
- 020204 information systems 3 Treffer
- 020207 software engineering 3 Treffer
- security bug 3 Treffer
- 0103 physical sciences 2 Treffer
- 010302 applied physics 2 Treffer
- 020202 computer hardware & architecture 2 Treffer
- computer security model 2 Treffer
- cryptography 2 Treffer
- security engineering 2 Treffer
- security testing 2 Treffer
- security through obscurity 2 Treffer
- vulnerability 2 Treffer
- 0102 computer and information sciences 1 Treffer
- 010201 computation theory & mathematics 1 Treffer
- 020201 artificial intelligence & image processing 1 Treffer
- 020203 distributed computing 1 Treffer
- 020206 networking & telecommunications 1 Treffer
- 0211 other engineering and technologies 1 Treffer
- 021103 operations research 1 Treffer
- access control 1 Treffer
- adversary 1 Treffer
- automation 1 Treffer
- avionics 1 Treffer
- cloud computing security 1 Treffer
- code (cryptography) 1 Treffer
- common vulnerabilities and exposures 1 Treffer
- computingmilieux_legalaspectsofcomputing 1 Treffer
- computingmilieux_thecomputingprofession 1 Treffer
- contest 1 Treffer
- debugging 1 Treffer
- fault injection 1 Treffer
- fault tolerance 1 Treffer
- fingerprint recognition 1 Treffer
- formal methods 1 Treffer
- full disclosure 1 Treffer
- hardware_performanceandreliability 1 Treffer
- human-computer interaction in information security 1 Treffer
- information security 1 Treffer
- intervention (law) 1 Treffer
- logical security 1 Treffer
- media_common 1 Treffer
- media_common.quotation_subject 1 Treffer
- multi-core processor 1 Treffer
- national vulnerability database 1 Treffer
Sprache
8 Treffer
-
In: IEEE Security & Privacy, Jg. 16 (2018-03-01), S. 52-60Online unknownZugriff:
-
In: IEEE Security & Privacy, Jg. 16 (2018-05-01), S. 90-94Online unknownZugriff:
-
In: IEEE Security & Privacy, Jg. 16 (2018-03-01), S. 32-36Online unknownZugriff:
-
In: IEEE Security & Privacy, Jg. 15 (2017), S. 58-65Online unknownZugriff:
-
In: IEEE Security & Privacy, Jg. 15 (2017), S. 6-9Online unknownZugriff:
-
In: IEEE Security & Privacy, Jg. 14 (2016-09-01), S. 80-83Online unknownZugriff:
-
In: IEEE Security & Privacy, 2016Online unknownZugriff:
-
In: IEEE Security & Privacy, Jg. 18 (2020-09-01), S. 28-37Online unknownZugriff: