Erscheinungsjahr
Fach
Format
Lizenz
TIB-Lesesaalbestand
LUH-Institutsbestand
Synonyme wurden verwendet für: Sicherheit
Suche ohne Synonyme: keywords:(Sicherheit)
Verwendete Synonyme:
- safety
- security
-
Security from Legacy Wireless Systems to 5G Networks
Wiley | 2024|Schlagwörter: security attacks, security services, wireless network security, wireless security architectures -
Critical analysis of the layered and systematic approaches for understanding IoT security threats and challenges
Elsevier | 2022|Schlagwörter: IoT security, IoT ecosystem security, Security requirements -
On the Security of A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing
Online Contents | 2021|Schlagwörter: Security protocol, Information security -
Efficient compressed sensing-based security approach for video surveillance application in wireless multimedia sensor networks
Elsevier | 2017|Schlagwörter: Security, Security keys -
A sentence-level text adversarial attack algorithm against IIoT based smart grid
Elsevier | 2021|Schlagwörter: IIoT security, Smart grid security -
ECC Based Lightweight Secure Message Conveyance Protocol for Satellite Communication in Internet of Vehicles (IoV)
Online Contents | 2020|Schlagwörter: Data security, Navigation and information security -
Performance Evaluation of a Hybrid Vehicle and Sensor Network to Prevent Traffic Accidents
TIBKAT | 2020|Schlagwörter: National security, Computer security -
A Secure and Efficient V2V Authentication Method in Heavy Traffic Environment
Online Contents | 2016|Schlagwörter: Vehicular security system, Security authentication, IoT security -
A Framework for Translating a High Level Security Policy into Low Level Security Mechanisms
Online Contents | 2010|Schlagwörter: security policy, security mangement, network security, security modeling -
Security challenges with network functions virtualization
Elsevier | 2016|Schlagwörter: Network security, Security threats -
Analysis of the physical layer security enhancing of wireless communication system under the random mobile
Freier ZugriffIET | 2019|Schlagwörter: system security, physical layer security research, random mobile user physical layer security model, security of data, telecommunication security, artificial noise security scheme, physical layer security performance, physical layer security enhancing -
Dataset to "Missed Opportunities: Measuring the Untapped TLS Support in the Industrial Internet of Things"
DataCite | 2021|Schlagwörter: network security, security configuration -
Applications and challenges of maintenance and safety engineering in industry 4.0
TIBKAT | 2020|Schlagwörter: Industrial safety -
Characterization and Simulation of a Propagation Model to Determine the Secondary Effects that Generate High Power and Frequency Electromagnetic Signs When Impact on Electronic Systems and Surface of Vehicles Family AMX13 of The Land Force
TIBKAT | 2020|Schlagwörter: National security, Computer security -
Utilizing wide area maritime domain awareness (MDA) data to cue a remote surveillance system [8899-44]
British Library Conference Proceedings | 2013|Schlagwörter: Quantum security, Security, Information security -
A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks
Elsevier | 2015|Schlagwörter: Security Attacks -
FMCW radar for the sense function of sense and avoid systems onboard UAVs [8899-43]
British Library Conference Proceedings | 2013|Schlagwörter: Quantum security, Security, Information security -
Social Mobilizations as a Silent Instrument for Seizing Power: The Ecuadorian Case
TIBKAT | 2020|Schlagwörter: National security, Computer security -
Only play in your comfort zone: interaction methods for improving security awareness on mobile devices
Online Contents | 2015|Schlagwörter: Security zones, Mobile security -
A Portable GSM Base Station Solution for Military Communications in Hostile Environments
TIBKAT | 2020|Schlagwörter: National security, Computer security -
When Agile Security Meets 5G
Freier ZugriffDOAJ | 2020|Schlagwörter: 5G security, agile security, cloud security, security risk management -
Probabilistic yoking proofs for large scale IoT systems
Elsevier | 2015|Schlagwörter: RFID security, IoT security -
An object-oriented modeling and simulation framework for bearings-only multi-target tracking using an unattended acoustic sensor network [8899-51]
British Library Conference Proceedings | 2013|Schlagwörter: Quantum security, Security, Information security -
On usage control for GRID systems
Elsevier | 2009|Schlagwörter: Security policies, Grid security, Distributed systems security -
Cloud security: Emerging threats and current solutions
Elsevier | 2016|Schlagwörter: Cloud computing security, Security techniques -
Simulation of transaction malleability attack for blockchain-based e-Voting
Elsevier | 2020|Schlagwörter: Blockchain Security, Security Evaluation -
Analysis of the physical layer security enhancing of wireless communication system under the random mobile
Freier ZugriffWiley | 2019|Schlagwörter: physical layer security research, artificial noise security scheme, physical layer security performance, security of data, system security, random mobile user physical layer security model, telecommunication security, physical layer security enhancing -
Diagnostics of an output interface of a safety-related system with safety PLC
Online Contents | 2017|Schlagwörter: Safety PLC, Safety integrity, Safety function -
An empirical study on security expert ecosystem in the future IoT service environment
Elsevier | 2016|Schlagwörter: Security ecosystem, Security expert -
MiSPiA: microelectronic single-photon 3D imaging arrays for low-light high-speed safety and security applications (Invited Paper) [8899-12]
British Library Conference Proceedings | 2013|Schlagwörter: Quantum security, Security, Information security -
NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model
Tema Archiv | 2012|Schlagwörter: Sicherheit, beweisbare Sicherheit -
Worldwide cyber security
British Library Conference Proceedings | 2012|Schlagwörter: Cyber security, Security -
Performance evaluation of the SRE and SBPG components of the IoT hardware platform security advisor framework
Elsevier | 2021|Schlagwörter: IoT security, Security framework, IoT security requirements, IoT security best practices -
Analysis and Security Evaluation of Security Threat on Broadcasting Service
Online Contents | 2017|Schlagwörter: Security, Security evaluation -
Multimodal layer surveillance map based on anomaly detection using multi‐agents for smart city security
Freier ZugriffWiley | 2022|Schlagwörter: smart‐city security, security robot -
Provably Secure Higher-Order Masking of AES
Tema Archiv | 2011|Schlagwörter: physikalische Security, Sicherheit, beweisbare Sicherheit -
A proof of revised yahalom protocol in the Bellare and Rogaway (1993) model
Tema Archiv | 2007|Schlagwörter: Sicherheit, beweisbare Sicherheit -
Understanding and overcoming cyber security anti-patterns
Elsevier | 2012|Schlagwörter: Cyber security, Security controls, Security governance -
Counter- b DM: A Provably Secure Family of Multi-Block-Length Compression Functions
Tema Archiv | 2014|Schlagwörter: Sicherheit, beweisbare Sicherheit -
Software Defined Mobile Network Security
Wiley | 2015|Schlagwörter: Security, Mobile network security, Security architecture -
Top Threats to Cloud: A Three-Dimensional Model of Cloud Security Assurance
Springer Verlag | 2021|Schlagwörter: Cloud security model, Cloud security requirements, Cloud security threats, Cloud security vulnerabilities, Cloud security solution -
Towards fully verifiable forward secure privacy preserving keyword search for IoT outsourced data
Elsevier | 2021|Schlagwörter: Cloud security, Forward security -
Continuity in Wireless Video Security System-Based Physical Security Services
Online Contents | 2013|Schlagwörter: Security policy, Security service, Physical security, Video security system -
AutoSecSDNDemo: Demonstration of automated end-to-end security in software-defined networks
Freier ZugriffFraunhofer Publica | 2016|Schlagwörter: SDN security, end-to-end security, network security -
Scalable RFID security framework and protocol supporting Internet of Things
Elsevier | 2014|Schlagwörter: Security protocol, Security framework -
Security analysis of socio-technical physical systems
Elsevier | 2015|Schlagwörter: Security assessment, Security model -
SecLooCI: A comprehensive security middleware architecture for shared wireless sensor networks
Elsevier | 2014|Schlagwörter: Security middleware, Security
Meine Suche schicken an (beta)
Schicken Sie ihre Suchanfrage (Suchterm ohne Filter) an andere Datenbanken, Portale und Kataloge, um ggf. weitere interessante Treffer zu finden:
Dimensions ist eine Datenbank für Abstracts und Zitate, die Informationen zu Forschungsförderungen mit daraus resultierenden Veröffentlichungen, Studien und Patenten verknüpft.
Im TIB AV-Portal können audiovisuelle Medien aus Wissenschaft und Lehre recherchiert und eigene wissenschaftliche Videos publiziert werden.
Im FID move kann nach fachspezifischer Literatur, Forschungsdaten und weitere Informationen aus der Mobilitäts- und Verkehrsforschung gesucht werden.
Der Open Research Knowledge Graph liefert strukturiert beschriebene Forschungsinhalte und macht diese vergleichbar.
Frei zugänglicher Ausschnitt der Verbunddatenbank K10plus des GBV und des SWB mit für die Fernleihe und Direktlieferdienste relevanten Materialien.