X
Search Filters
Format Format
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
cloud computing (7) 7
artificial intelligence (2) 2
cloud security (2) 2
cyberterrorism (2) 2
ddos (2) 2
fog computing (2) 2
infrastructure (2) 2
safety and security measures (2) 2
service-provider (2) 2
aedes - microbiology (1) 1
aedes - physiology (1) 1
aedes-aegypti (1) 1
algorithm (1) 1
algorithms (1) 1
animals (1) 1
bandwidth (1) 1
big data (1) 1
cloud network (1) 1
cloud-computing (1) 1
cluster computing (1) 1
computation (1) 1
computer crime (1) 1
computer science (1) 1
computer science, general (1) 1
computer security (1) 1
data center (1) 1
data mining and knowledge discovery (1) 1
data security (1) 1
database management (1) 1
ddos mitigation (1) 1
defense in depth (1) 1
dengue (1) 1
denial of service attacks (1) 1
density (1) 1
disease control (1) 1
distributed computing (1) 1
distributed denial of service (1) 1
domains (1) 1
dos (1) 1
dwellings (1) 1
dynamics (1) 1
e-mail (1) 1
echtzeitdaten (1) 1
edge computing (1) 1
edge security (1) 1
electronic mail systems (1) 1
entomology (1) 1
environmental science (1) 1
environmental science and technology (1) 1
families (1) 1
female (1) 1
field performance (1) 1
floods (1) 1
geography (1) 1
housing (1) 1
hunting (1) 1
hybrid cloud (1) 1
icmp flood (1) 1
index medicus (1) 1
information flow (1) 1
information technology (1) 1
informationstechnologie (1) 1
infrastruktur (1) 1
internet der dinge (1) 1
internet of things (1) 1
invasion success (1) 1
iot (1) 1
konzentrat (1) 1
landschaft (1) 1
literature reviews (1) 1
marktnachfrage (1) 1
mosquito control (1) 1
mosquitoes (1) 1
multiple tiers (1) 1
network architecture (1) 1
network congestion (1) 1
netzmodell (1) 1
north queensland (1) 1
organisationssystem (1) 1
oviposition (1) 1
ovitrap (1) 1
pervasive computing (1) 1
planmässige instandhaltung (1) 1
population density (1) 1
productivity (1) 1
protocols (1) 1
qos complexity (1) 1
queensland (1) 1
real time (1) 1
rechenelement (1) 1
residence characteristics (1) 1
sampling (1) 1
security management (1) 1
server (1) 1
servers (1) 1
service-qualität (1) 1
spatial variation (1) 1
spread (1) 1
stegomyia aegypti (1) 1
stillstandzeit (1) 1
more...
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Network Security, ISSN 1353-4858, 06/2019, Volume 2019, Issue 6, pp. 15 - 19
In today's dynamic cyber security environment, with its rapidly changing threat landscape, companies are becoming increasingly aware of the necessity of... 
Hunting
Journal Article
Computer Fraud & Security, ISSN 1361-3723, 02/2019, Volume 2019, Issue 2, pp. 12 - 19
Cloud computing has become one of the most critical components of businesses and corporate organisations worldwide. It is a technology that has applications... 
Cloud computing | Safety and security measures | Data security | Cyberterrorism
Journal Article
Network Security, ISSN 1353-4858, 04/2018, Volume 2018, Issue 4, pp. 15 - 19
As datacentre operations and the accessing of applications over the Internet increases, cyber-attackers view this as a surge in the threat surface area that... 
Cyberterrorism
Journal Article
International Journal of e-Business Research, ISSN 1548-1131, 10/2018, Volume 14, Issue 4, pp. 78 - 90
Journal Article
International Journal of E-Business Research, ISSN 1548-1131, 10/2018, Volume 14, Issue 4, p. 78
Cloud computing has slowly but surely become the foremost service provider for information technology applications and platform delivery. However, Cloud issues... 
Literature reviews | Cloud computing | Taxonomy | Computation | Real time | Computer security | Information technology
Journal Article
Network Security, ISSN 1353-4858, 11/2017, Volume 2017, Issue 11, pp. 8 - 15
Over the past few years, the recognition and acceptance of cloud-based applications has gained a lot of momentum. Commercial applications that were initially... 
Infrastructure (Economics) | Cloud computing | Electronic mail systems | Safety and security measures
Journal Article
International Journal of Information Technology and Web Engineering, ISSN 1554-1045, 10/2018, Volume 13, Issue 4, pp. 61 - 77
This article describes how cloud computing has become a significant IT infrastructure in business, government, education, research, and service industry... 
Three Tier | Defense in Depth | Cloud Computing | DDoS | DDoS Mitigation | Multiple Tiers | Algorithm | Data Center | Network Architecture | Hybrid Cloud | Domains | Cloud computing | Denial of service attacks | Algorithms | Security management | Information flow | Infrastructure
Journal Article
Network Security, ISSN 1353-4858, 10/2019, Volume 2019, Issue 10, pp. 13 - 19
Robotic technology has been rapidly transforming world economies in terms of business productivity and profitability. The market is shifting towards... 
Journal Article
2012, 2012, Lecture Notes in Electrical Engineering, ISBN 9783642287978, Volume 157, Issue 2
The IT Industry and the wider media are abuzz with the phrase “cloud computing” and most of us have no idea what this latest terminology means. This paper... 
Artificial Intelligence (incl. Robotics) | Computer Science, general | Computer Science | Database Management | Data Mining and Knowledge Discovery | virtual computing | cluster computing | cloud computing | pervasive computing | distributed computing
Book Chapter
International Journal of Computers and Applications, ISSN 1206-212X, 2018, pp. 1 - 18
Journal Article
EAI Endorsed Transactions on Internet of Things, ISSN 2414-1399, 07/2018, p. 162221
Journal Article
08/2016, ISBN 9781522506027
Book Chapter
2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES), 10/2016, pp. 793 - 798
Cloud computing has started to gain acceptance for adoption and implementation among organizations, however, this new technology area has already started to... 
Cloud computing | Protocols | Cloud Security | ICMP Flood | Bandwidth | DoS | DDoS | Distributed Denial of Service | Floods | Servers | Computer crime | Cloud Computing
Conference Proceeding
10/2016, ISBN 9781522516071, 31
The existence of the human race has created inevitable effects on our surrounding environment. To prevent further harm to the world’s ecosystems, it becomes... 
Environmental Science | Environmental Science and Technology | Sustainable development | Sustainability
Book Chapter
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.