|
2381 |
1.3 CLOUD Enthalten in Digitale Welt Bd. 6, 17.12.2021, Nr. 1, date:1.2022: 63-65
|
|
|
2382 |
1.3 Sicherheitskultur Enthalten in Digitale Welt Bd. 5, 4.12.2020, Nr. 1, date:1.2021: 50-55
|
|
|
2383 |
1.4 ARBEITSWELT Enthalten in Digitale Welt Bd. 6, 17.12.2021, Nr. 1, date:1.2022: 68-71
|
|
|
2384 |
1.5 REAKTIONEN Enthalten in Digitale Welt Bd. 6, 17.12.2021, Nr. 1, date:1.2022: 75-76
|
|
|
2385 |
1.6 AUTH Enthalten in Digitale Welt Bd. 6, 17.12.2021, Nr. 1, date:1.2022: 86-87
|
|
|
2386 |
A novel vulnerability prediction model to predict vulnerability loss based on probit regression Enthalten in Wuhan University journal of natural sciences Bd. 21, 17.8.2017, Nr. 3, date:6.2016: 214-220
|
|
|
2387 |
A star-style trust model with the ability of data recovery for trusted computing platform Enthalten in Wuhan University journal of natural sciences Bd. 21, 30.8.2017, Nr. 2, date:4.2016: 115-120
|
|
|
2388 |
A survey of botnet detection based on DNS Enthalten in Neural computing & applications Bd. 28, 12.12.2015, Nr. 7, date:7.2017: 1541-1558
|
|
|
2389 |
Anomaly detection and classification using a metric for determining the significance of failures Enthalten in Neural computing & applications Bd. 28, 31.8.2016, Nr. 6, date:6.2017: 1265-1275
|
|
|
2390 |
„Auch rechtlich ist ein Ignorieren grundlegender Vorbereitungen gegen Angriffe nicht mehr vertretbar“ Enthalten in Wirtschaftsinformatik & Management Bd. 10, 19.10.2018, Nr. 5, date:10.2018: 26-29
|
|