Suchergebnisse
UB Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Gefunden in
Art der Quelle
Schlagwort
- botnet 1 Treffer
- browsers 1 Treffer
- cloud computing 1 Treffer
- cloud security 1 Treffer
- cloud vulnerabilities 1 Treffer
-
16 weitere Werte:
- computer crime 1 Treffer
- computer hacking 1 Treffer
- computers 1 Treffer
- cost model 1 Treffer
- databases 1 Treffer
- ddos 1 Treffer
- electronic mail 1 Treffer
- engines 1 Treffer
- internet 1 Treffer
- measurement 1 Treffer
- security 1 Treffer
- security metrics 1 Treffer
- servers 1 Treffer
- spam email 1 Treffer
- vulnerability assessment 1 Treffer
- vulnerability lifecycle 1 Treffer
Publikation
- 2015 10th international conference for internet technology and secured transactions (icitst), internet technology and secured transactions (icitst), 2015 10th international conference for 1 Treffer
- the 9th international conference for internet technology and secured transactions (icitst-2014), internet technology and secured transactions (icitst), 2014 9th international conference for 1 Treffer
2 Treffer
-
In: The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014), 2014-12-01, S. 318-323KonferenzZugriff:
-
In: 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), 2015-12-01, S. 51-57KonferenzZugriff: