|
55121 |
User privacy-enhanced security architecture for home area network of Smartgrid Enthalten in Multimedia tools and applications Bd. 75, 30.1.2016, Nr. 20, date:10.2016: 12749-12764
|
|
|
55122 |
User-Silicon Entangled Mobile Identity Authentication Enthalten in Journal of hardware and systems security Bd. 4, 2.7.2020, Nr. 3, date:9.2020: 208-229
|
|
|
55123 |
Users’ perceptions about mobile security breaches Enthalten in Information systems and e-business management Bd. 14, 28.12.2015, Nr. 4, date:11.2016: 857-882
|
|
|
55124 |
Using Artificial Neural Networks to Estimate the Probability of Information Security Threat Occurrences Enthalten in Automatic control and computer sciences Bd. 55, 1.3.2022, Nr. 8, date:12.2021: 941-948
|
|
|
55125 |
Using ASPICE 4 with Safety and Security Enthalten in ATZelectronics worldwide Bd. 19, 4.10.2024, Nr. 10, date:10.2024: 44-49
|
|
|
55126 |
Using Bayesian networks to guide the assessment of new evidence in an appeal case Enthalten in Crime Science Bd. 5, 25.5.2016, Nr. 1, date:12.2016: 1-12
|
|
|
55127 |
Using crime script analysis to elucidate the details of Amur tiger poaching in the Russian Far East Enthalten in Crime Science Bd. 10, 30.6.2021, Nr. 1, date:12.2021: 1-25
|
|
|
55128 |
Using deep learning to solve computer security challenges: a survey Enthalten in Cybersecurity Bd. 3, 10.8.2020, Nr. 1, date:12.2020: 1-32
|
|
|
55129 |
Using ecosystem service supply and ecosystem sensitivity to identify landscape ecology security patterns in the Lanzhou-Xining urban agglomeration, China Enthalten in Journal of mountain science Bd. 17, 11.11.2020, Nr. 11, date:11.2020: 2758-2773
|
|
|
55130 |
Using Fuzzy Logic Algorithms and Growing Hierarchical Self-Organizing Maps to Define Efficient Security Inspection Strategies in a Container Terminal Enthalten in International journal of computational intelligence systems Bd. 13, 21.5.2020, Nr. 1, date:1.2020: 604-623
|
|