Sie befinden Sich nicht im Netzwerk der Universität Paderborn. Der Zugriff auf elektronische Ressourcen ist gegebenenfalls nur via VPN oder Shibboleth (DFN-AAI) möglich. mehr Informationen...
Einfacher Volltextzugriff von (fast) überall
Installieren Sie die LibKey Nomad-Browsererweiterung und erhalten Sie von vielen Webseiten einfachen Zugriff auf lizenzierte Volltexte oder Open Access Publikationen. Mehr erfahren...
International journal of educational reform, 2023-01, Vol.32 (1), p.3-18
2023
Volltextzugriff (PDF)



Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation, 2018, Vol.844, p.124-131
2018
Volltextzugriff (PDF)

Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation, 2018, Vol.844, p.193-204
2018
Volltextzugriff (PDF)

Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation, 2018, Vol.844, p.87-97
2018
Volltextzugriff (PDF)

Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation, 2018, Vol.844, p.113-123
2018
Volltextzugriff (PDF)

Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation, 2018, Vol.844, p.242-253
2018
Volltextzugriff (PDF)

Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation, 2018, Vol.844, p.13-24
2018
Volltextzugriff (PDF)

Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation, 2018, Vol.844, p.98-109
2018
Volltextzugriff (PDF)

Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation, 2018, Vol.844, p.183-192
2018
Volltextzugriff (PDF)

Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation, 2018, Vol.844, p.135-143
2018
Volltextzugriff (PDF)

Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation, 2018, Vol.844, p.47-57
2018
Volltextzugriff (PDF)

Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation, 2018, Vol.844, p.74-86
2018
Volltextzugriff (PDF)

Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation, 2018, Vol.844, p.144-171
2018
Volltextzugriff (PDF)

Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation, 2018, Vol.844, p.214-228
2018
Volltextzugriff (PDF)

Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation, 2018, Vol.844, p.205-213
2018
Volltextzugriff (PDF)

Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation, 2018, Vol.844, p.37-46
2018
Volltextzugriff (PDF)

Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation, 2018, Vol.844, p.172-182
2018
Volltextzugriff (PDF)

Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation, 2018, Vol.844, p.58-73
2018
Volltextzugriff (PDF)

Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation, 2018, Vol.844, p.25-36
2018
Volltextzugriff (PDF)

Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation, 2018, Vol.844, p.3-12
2018
Volltextzugriff (PDF)

Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation, 2018, Vol.844, p.229-241
2018
Volltextzugriff (PDF)