Suchergebnisse
UB Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Gefunden in
Art der Quelle
Schlagwort
- computer security 34 Treffer
- privacy 20 Treffer
- security 14 Treffer
- information security 10 Treffer
- computer hacking 9 Treffer
-
45 weitere Werte:
- software engineering 9 Treffer
- programming 7 Treffer
- application software 6 Treffer
- data security 6 Treffer
- software testing 5 Treffer
- testing 5 Treffer
- cryptography 4 Treffer
- hacking without humans 4 Treffer
- software 4 Treffer
- static analysis 4 Treffer
- symbolic execution 4 Treffer
- vulnerabilities 4 Treffer
- automatic testing 3 Treffer
- autonomous systems 3 Treffer
- best practices 3 Treffer
- browsers 3 Treffer
- costs 3 Treffer
- cyber grand challenge 3 Treffer
- games 3 Treffer
- hardware 3 Treffer
- history 3 Treffer
- humans 3 Treffer
- internet 3 Treffer
- interviews 3 Treffer
- operating systems 3 Treffer
- risk analysis 3 Treffer
- software development 3 Treffer
- software security 3 Treffer
- software tools 3 Treffer
- system testing 3 Treffer
- writing 3 Treffer
- attack trends 2 Treffer
- books 2 Treffer
- codes 2 Treffer
- computer architecture 2 Treffer
- computer crime 2 Treffer
- computer errors 2 Treffer
- computer languages 2 Treffer
- computer networks 2 Treffer
- cybersecurity 2 Treffer
- debugging 2 Treffer
- design engineering 2 Treffer
- digital audio broadcasting 2 Treffer
- encoding 2 Treffer
- fuzzing 2 Treffer
48 Treffer
-
In: IEEE Security & Privacy, Jg. 17 (2019-07-01), Heft 4, S. 53-61Online academicJournalZugriff:
-
In: IEEE Security & Privacy, Jg. 12 (2014), Heft 1, S. 83-87Online academicJournalZugriff:
-
In: IEEE Security & Privacy, Jg. 21 (2023-03-01), Heft 2, S. 18-23Online academicJournalZugriff:
-
In: IEEE Security & Privacy, Jg. 20 (2022-09-01), Heft 5, S. 60-76Online academicJournalZugriff:
-
In: IEEE Security & Privacy, Jg. 20 (2022-05-01), Heft 3, S. 65-70Online academicJournalZugriff:
-
In: IEEE Security & Privacy, Jg. 17 (2019-11-01), Heft 6, S. 84-88Online academicJournalZugriff:
-
In: IEEE Security & Privacy, Jg. 19 (2021-05-01), Heft 3, S. 8-16Online academicJournalZugriff:
-
In: IEEE Security & Privacy, Jg. 17 (2019), Heft 1, S. 78-82Online academicJournalZugriff:
-
In: IEEE Security & Privacy, Jg. 16 (2018-04-01), Heft 2, S. 61-69Online academicJournalZugriff:
-
In: IEEE Security & Privacy, Jg. 16 (2018-04-01), Heft 2, S. 52-60Online academicJournalZugriff:
-
In: IEEE Security & Privacy, Jg. 16 (2018-11-01), Heft 6, S. 4-9Online academicJournalZugriff:
-
In: IEEE Security & Privacy, Jg. 18 (2020-09-01), Heft 5, S. 79-80Online academicJournalZugriff:
-
In: IEEE Security & Privacy, Jg. 16 (2018-06-01), Heft 3, S. 90-94Online academicJournalZugriff:
-
In: IEEE Security & Privacy, Jg. 16 (2018-04-01), Heft 2, S. 32-36Online academicJournalZugriff:
-
In: IEEE Security & Privacy, Jg. 16 (2018-04-01), Heft 2, S. 23-31Online academicJournalZugriff:
-
In: IEEE Security & Privacy, Jg. 13 (2015-07-01), Heft 4, S. 7-9Online academicJournalZugriff:
-
In: IEEE Security & Privacy, Jg. 15 (2017), Heft 3, S. 6-9Online academicJournalZugriff:
-
In: IEEE Security & Privacy, Jg. 9 (2011-05-01), Heft 3, S. 74-77Online academicJournalZugriff:
-
In: IEEE Security & Privacy, Jg. 12 (2014-05-01), Heft 3, S. 45-53Online academicJournalZugriff:
-
In: IEEE Security & Privacy, Jg. 13 (2015-07-01), Heft 4, S. 66-72Online academicJournalZugriff: