Suchergebnisse
UB Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Gefunden in
Art der Quelle
Schlagwort
- business 5 Treffer
- business.industry 5 Treffer
- computer security 5 Treffer
- computer network 4 Treffer
- denial of service attacks 4 Treffer
-
45 weitere Werte:
- computer 3 Treffer
- computer.software_genre 3 Treffer
- computersystemsorganization_computer-communicationnetworks 3 Treffer
- application layer ddos attack 2 Treffer
- computer network security 2 Treffer
- computer science 2 Treffer
- denial-of-service attack 2 Treffer
- engineering 2 Treffer
- network security 2 Treffer
- access control of telecommunication systems 1 Treffer
- activism 1 Treffer
- adversary model 1 Treffer
- algorithm 1 Treffer
- algorithms 1 Treffer
- applied communication 1 Treffer
- attack model 1 Treffer
- bandwidths 1 Treffer
- battery chargers -- usage 1 Treffer
- buffer overflow 1 Treffer
- business technology 1 Treffer
- cardiovascular diseases -- care and treatment 1 Treffer
- care and treatment 1 Treffer
- chronic kidney failure -- care and treatment 1 Treffer
- community, democracy, and policy 1 Treffer
- computer architecture 1 Treffer
- computer crimes 1 Treffer
- computer network architectures 1 Treffer
- computer network resources 1 Treffer
- computer networks 1 Treffer
- computer science-general interest 1 Treffer
- computer security model 1 Treffer
- cybercrime 1 Treffer
- cyberterrorism 1 Treffer
- cyberterrorism -- usage 1 Treffer
- cyberwar 1 Treffer
- data security -- usage 1 Treffer
- data security issue 1 Treffer
- denial of service attacks -- usage 1 Treffer
- dentistry 1 Treffer
- domain names -- methods 1 Treffer
- dos 1 Treffer
- droit 1 Treffer
- electric vehicles -- usage 1 Treffer
- foreign investments -- usage 1 Treffer
- general communication & media studies 1 Treffer
Publikation
Sprache
18 Treffer
-
In: Bell Labs Technical Journal, Jg. 12 (2007-10-01), Heft 3, S. 121-130Online academicJournalZugriff:
-
In: The Internet Encyclopedia, 2004-04-15NachschlagewerkZugriff:
-
2013Online unknownZugriff:
-
2013Online unknownZugriff:
-
In: IET Information Security, Jg. 17 (2023), Heft 1, S. 102-117academicJournalZugriff:
-
In: IET Generation, Transmission & Distribution, Jg. 15 (2021-12-01), Heft 24, S. 3435-3449academicJournalZugriff:
-
In: IET Information Security, Jg. 15 (2021-05-10), Heft 5, S. 351-363academicJournalZugriff:
-
In: IET Communications, Jg. 16 (2022-12-01), Heft 20, S. 2422-2430academicJournalZugriff:
-
In: IET Networks, Jg. 11 (2022-09-01), Heft 5, S. 169-181academicJournalZugriff:
-
In: The International Encyclopedia of Media Literacy, 2019-05-10, S. 1-9NachschlagewerkZugriff:
-
In: Febs Open Bio, Jg. 11 (2021-05-24), Heft 8, S. 2095-2109academicJournalZugriff:
-
2004Online unknownZugriff:
-
In: Bell Labs Technical Journal, Jg. 14 (2009-03-01), Heft 1, S. 219-242Online academicJournalZugriff:
-
In: Wiley Encyclopedia of Computer Science and Engineering, 2007-03-15, S. 12NachschlagewerkZugriff:
-
2008Online unknownZugriff: