Suchergebnisse
LBZ-Katalog
Aufsätze und mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- cybersecurity 12 Treffer
- industrial controls manufacturing 7 Treffer
- internet security 7 Treffer
- cyberterrorism 6 Treffer
- anomaly detection 4 Treffer
-
45 weitere Werte:
- internet of things 4 Treffer
- security 4 Treffer
- critical infrastructure 3 Treffer
- cyber physical systems 3 Treffer
- deep learning 3 Treffer
- malware 3 Treffer
- operational technology 3 Treffer
- anomaly detection (computer security) 2 Treffer
- automation 2 Treffer
- cyber security 2 Treffer
- cyber-physical systems 2 Treffer
- cyberthreats 2 Treffer
- dependability 2 Treffer
- domain specific language 2 Treffer
- electric power distribution grids 2 Treffer
- embedded computer systems 2 Treffer
- embedded system 2 Treffer
- engineering reliability theory 2 Treffer
- functional safety 2 Treffer
- industrie 4.0 2 Treffer
- industry 4.0 2 Treffer
- infrastructure (economics) 2 Treffer
- intrusion detection systems (computer security) 2 Treffer
- iot 2 Treffer
- programmable controllers 2 Treffer
- reinforcement learning 2 Treffer
- reliability theory 2 Treffer
- research and development 2 Treffer
- resilience 2 Treffer
- scada 2 Treffer
- smart grid 2 Treffer
- smart power grids 2 Treffer
- threat modeling 2 Treffer
- virtual private networks 2 Treffer
- water distribution 2 Treffer
- access control 1 Treffer
- adaptation 1 Treffer
- affordance 1 Treffer
- ahp 1 Treffer
- algorithms 1 Treffer
- analytic hierarchy process 1 Treffer
- artificial intelligence 1 Treffer
- assets (accounting) 1 Treffer
- attack simulation 1 Treffer
- attacks 1 Treffer
Verlag
- mdpi 9 Treffer
- association for computing machinery 2 Treffer
- de gruyter 2 Treffer
- international group on reliability 2 Treffer
- springer international publishing 2 Treffer
-
11 weitere Werte:
- springer nature 2 Treffer
- academic conferences international 1 Treffer
- bucharest university of economic studies, faculty of management 1 Treffer
- industry dive 1 Treffer
- jomard publishing 1 Treffer
- national aviation university 1 Treffer
- pro con ltd. 1 Treffer
- pukhov institute for modeling in energy engineering national academy of sciences of ukraine 1 Treffer
- routledge 1 Treffer
- springer us 1 Treffer
- wiley-blackwell 1 Treffer
Publikation
- energies (19961073) 3 Treffer
- annals of telecommunications 2 Treffer
- automatisierungstechnik 2 Treffer
- energy informatics 2 Treffer
- reliability: theory & applications 2 Treffer
-
16 weitere Werte:
- sensors (14248220) 2 Treffer
- acm computing surveys 1 Treffer
- applied sciences (2076-3417) 1 Treffer
- business excellence & management 1 Treffer
- cybersecurity dive 1 Treffer
- digital threats: research & practice 1 Treffer
- electronics (2079-9292) 1 Treffer
- elektronnoe modelirovanie 1 Treffer
- information & security 1 Treffer
- journal of modern technology & engineering 1 Treffer
- mathematics (2227-7390) 1 Treffer
- proceedings of the european conference on cyber warfare & security 1 Treffer
- risk analysis: an international journal 1 Treffer
- routledge handbook of crime science 1 Treffer
- sustainability (2071-1050) 1 Treffer
- wireless networks: the journal of mobile communication, computation and information 1 Treffer
Sprache
Inhaltsanbieter
29 Treffer
-
In: Proceedings of the European Conference on Cyber Warfare & Security, 2023-06-01, S. 410-419KonferenzZugriff:
-
In: Digital Threats: Research & Practice, Jg. 4 (2023-12-01), Heft 4, S. 1-19academicJournalZugriff:
-
In: Sensors (14248220), Jg. 23 (2023-11-01), Heft 21, S. 8840-8880Online academicJournalZugriff:
-
In: Ukrainian Information Security Research Journal; Vol. 17 No. 3 (2015); 225-230 ; Защита информации; Том 17 № 3 (2015); 225-230 ; Захист інформації; Том 17 № 3 (2015); 225-230, 2015Online academicJournalZugriff:
-
In: Wireless Networks: The Journal of Mobile Communication, Computation and Information, 2024-01-25, S. 1-14Online academicJournalZugriff:
-
In: Sensors (14248220), Jg. 23 (2023-08-01), Heft 15, S. 6778-6794Online academicJournalZugriff:
-
In: Annals of Telecommunications, Jg. 77 (2022-12-01), Heft 11/12, S. 749-761Online academicJournalZugriff:
-
In: Mathematics (2227-7390), Jg. 10 (2022-11-15), Heft 22, S. 4373-4392Online academicJournalZugriff:
-
In: Automatisierungstechnik, Jg. 67 (2019-05-01), Heft 5, S. 372-382Online academicJournalZugriff:
-
In: Applied Sciences (2076-3417), Jg. 12 (2022-10-01), Heft 19, S. 9594-9614Online academicJournalZugriff:
-
In: Èlektronnoe Modelirovanie, Jg. 44 (2022-09-01), Heft 5, S. 61-72academicJournalZugriff:
-
In: ACM Computing Surveys, Jg. 54 (2022-01-03), S. 1-35academicJournalZugriff:
-
In: Routledge Handbook of Crime Science; (2019) S. 288-308BuchZugriff:
-
In: Journal of Modern Technology & Engineering, Jg. 6 (2021-10-01), Heft 3, S. 219-229academicJournalZugriff:
-
In: Business Excellence & Management, Jg. 11 (2021-03-01), Heft 1, S. 68-79Online academicJournalZugriff:
-
In: Energy Informatics, Jg. 3 (2020-12-01), Heft 1Online academicJournalZugriff:
-
In: Cybersecurity Dive, 2024-03-14, S. N.PAGserialPeriodicalZugriff:
-
In: Risk Analysis: An International Journal, Jg. 37 (2017-07-01), Heft 7, S. 1298-1314Online academicJournalZugriff:
-
In: Information & Security, Jg. 38 (2017-07-01), Heft 1, S. 93-108academicJournalZugriff:
-
In: Reliability: Theory & Applications, Jg. 12 (2017-03-01), Heft 1, S. 26-37academicJournalZugriff: