Suchergebnisse
UB Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Gefunden in
Art der Quelle
Schlagwort
- computer bugs 48 Treffer
- computer security 41 Treffer
- privacy 24 Treffer
- security 20 Treffer
- information security 11 Treffer
-
45 weitere Werte:
- computer hacking 9 Treffer
- software engineering 9 Treffer
- programming 8 Treffer
- application software 7 Treffer
- data security 7 Treffer
- software testing 6 Treffer
- testing 6 Treffer
- cryptography 5 Treffer
- software 5 Treffer
- computer crime 4 Treffer
- hacking without humans 4 Treffer
- hardware 4 Treffer
- interviews 4 Treffer
- operating systems 4 Treffer
- safety 4 Treffer
- software security 4 Treffer
- software tools 4 Treffer
- static analysis 4 Treffer
- symbolic execution 4 Treffer
- vulnerabilities 4 Treffer
- writing 4 Treffer
- automatic testing 3 Treffer
- autonomous systems 3 Treffer
- best practices 3 Treffer
- browsers 3 Treffer
- computer architecture 3 Treffer
- computer errors 3 Treffer
- costs 3 Treffer
- cyber grand challenge 3 Treffer
- encoding 3 Treffer
- games 3 Treffer
- history 3 Treffer
- humans 3 Treffer
- internet 3 Treffer
- kernel 3 Treffer
- network servers 3 Treffer
- protection 3 Treffer
- risk analysis 3 Treffer
- silver bullet 3 Treffer
- software development 3 Treffer
- system testing 3 Treffer
- algorithm design and analysis 2 Treffer
- attack trends 2 Treffer
- books 2 Treffer
- central processing unit 2 Treffer
65 Treffer
-
In: IEEE Security & Privacy, Jg. 17 (2019-07-01), Heft 4, S. 53-61Online academicJournalZugriff:
-
In: IEEE Security & Privacy, Jg. 12 (2014), Heft 1, S. 83-87Online academicJournalZugriff:
-
In: IEEE Security & Privacy, Jg. 2 (2004), Heft 1, S. 66-68Online academicJournalZugriff:
-
In: IEEE Security & Privacy, Jg. 21 (2023-03-01), Heft 2, S. 18-23Online academicJournalZugriff:
-
In: IEEE Security & Privacy, Jg. 20 (2022-09-01), Heft 5, S. 60-76Online academicJournalZugriff:
-
In: IEEE Security & Privacy, Jg. 20 (2022-05-01), Heft 3, S. 65-70Online academicJournalZugriff:
-
In: IEEE Security & Privacy, Jg. 17 (2019-11-01), Heft 6, S. 84-88Online academicJournalZugriff:
-
In: IEEE Security & Privacy, Jg. 19 (2021-05-01), Heft 3, S. 8-16Online academicJournalZugriff:
-
In: IEEE Security & Privacy, Jg. 17 (2019), Heft 1, S. 78-82Online academicJournalZugriff:
-
In: IEEE Security & Privacy, Jg. 16 (2018-04-01), Heft 2, S. 61-69Online academicJournalZugriff:
-
In: IEEE Security & Privacy, Jg. 16 (2018-04-01), Heft 2, S. 52-60Online academicJournalZugriff:
-
In: IEEE Security & Privacy, Jg. 18 (2020-09-01), Heft 5, S. 79-80Online academicJournalZugriff:
-
In: IEEE Security & Privacy, Jg. 16 (2018-11-01), Heft 6, S. 4-9Online academicJournalZugriff:
-
In: IEEE Security & Privacy, Jg. 16 (2018-06-01), Heft 3, S. 90-94Online academicJournalZugriff:
-
In: IEEE Security & Privacy, Jg. 16 (2018-04-01), Heft 2, S. 32-36Online academicJournalZugriff:
-
In: IEEE Security & Privacy, Jg. 16 (2018-04-01), Heft 2, S. 23-31Online academicJournalZugriff:
-
In: IEEE Security & Privacy, Jg. 13 (2015-07-01), Heft 4, S. 7-9Online academicJournalZugriff:
-
In: IEEE Security & Privacy, Jg. 15 (2017), Heft 3, S. 6-9Online academicJournalZugriff:
-
In: IEEE Security & Privacy, Jg. 9 (2011-05-01), Heft 3, S. 74-77Online academicJournalZugriff:
-
In: IEEE Security & Privacy, Jg. 12 (2014-05-01), Heft 3, S. 45-53Online academicJournalZugriff: