Synonyme wurden verwendet für: Sicherheit
Suche ohne Synonyme: keywords:(Sicherheit)
Verwendete Synonyme:
- safety
- security
-
Analysis of the physical layer security enhancing of wireless communication system under the random mobile
Freier ZugriffIET | 2019|Schlagwörter: system security, physical layer security research, random mobile user physical layer security model, security of data, telecommunication security, artificial noise security scheme, physical layer security performance, physical layer security enhancing -
Multi-objective evolutionary approach to select security solutions
Freier ZugriffIET | 2017|Schlagwörter: security issues, optimised security method, efficient security solutions, security methods -
Physical layer security with dynamic behaviour cooperator based on coalitional game
Freier ZugriffIET | 2014|Schlagwörter: physical layer security, original security transmission condition, maximum PHY security capacity, security of data -
Mitigating application layer distributed denial of service attacks via effective trust management
IET | 2010|Schlagwörter: telecommunication security, security of data -
Distribution network reconfiguration comprehensively considering N−1 security and network loss
Freier ZugriffIET | 2018|Schlagwörter: N−1 security criterion, N−1 security margin, power system security, distribution system security region, security margin constraints -
Physical-layer security in Internet of Things based on compressed sensing and frequency selection
Freier ZugriffIET | 2017|Schlagwörter: physical layer security, security method, CS security model, telecommunication security, information security -
Physical unclonable function: architectures, applications and challenges for dependable security
Freier ZugriffIET | 2020|Schlagwörter: dependable security, security solutions, security of data, hardware-specific security primitive, desired security levels, telecommunication security -
Power maximisation technique for generating secret keys by exploiting physical layer security in wireless communication
Freier ZugriffIET | 2020|Schlagwörter: secret key based security, physical layer security, communication security, keyless security, telecommunication security, secret key-based security -
Passenger acceptance of counter-terrorism security measures in stations
Freier ZugriffIET | 2016|Schlagwörter: individual passenger security screening methods, security, counter terrorism security -
Light-weight framework for security-sensitive wireless sensor networks applications
Freier ZugriffIET | 2013|Schlagwörter: security-sensitive wireless sensor networks applications, security framework, security-sensitive WSN, security-sensitive WSN applications, security, telecommunication security -
Secrets of the data stream [security system]
IET | 2010|Schlagwörter: telecommunication security, security of data -
Effective metric for detecting distributed denial-of-service attacks based on information divergence
IET | 2009|Schlagwörter: security of data -
Security-level classification based on power system partitioning
Freier ZugriffIET | 2019|Schlagwörter: security margin index, power system security states, security assessment, power system security, security-level classification, exact security level, security classification, comprehensive safety index -
Steady-state security assessment method based on distance to security region boundaries
Freier ZugriffIET | 2013|Schlagwörter: steady state security assessment method, security margins, power system security, steady state security region, steady state security distance, security region boundaries -
Coherence analysis of road safe speed and driving behaviour from floating car data
Freier ZugriffIET | 2020|Schlagwörter: safety driver advisory unit, safety measures, road safety performances process, safety monitoring, road safety, smart road safety analysis, general road safety analysis framework, safety conditions, safety enforcement schemes -
Simulation framework for security threats in cognitive radio networks
IET | 2012|Schlagwörter: telecommunication security -
Multi-objective generation dispatch considering the trade-off between economy and security
Freier ZugriffIET | 2017|Schlagwörter: deterministic N−1 security criterion, power system security, security-constrained optimal power flow, security objectives -
Relay selection for secure backscatter wireless communications
Freier ZugriffIET | 2015|Schlagwörter: physical layer security, telecommunication security, anti-eavesdropping security
Meine Suche schicken an (beta)
Schicken Sie ihre Suchanfrage (Suchterm ohne Filter) an andere Datenbanken, Portale und Kataloge, um ggf. weitere interessante Treffer zu finden:
Dimensions ist eine Datenbank für Abstracts und Zitate, die Informationen zu Forschungsförderungen mit daraus resultierenden Veröffentlichungen, Studien und Patenten verknüpft.
Im TIB AV-Portal können audiovisuelle Medien aus Wissenschaft und Lehre recherchiert und eigene wissenschaftliche Videos publiziert werden.
Im FID move kann nach fachspezifischer Literatur, Forschungsdaten und weitere Informationen aus der Mobilitäts- und Verkehrsforschung gesucht werden.
Der Open Research Knowledge Graph liefert strukturiert beschriebene Forschungsinhalte und macht diese vergleichbar.
Frei zugänglicher Ausschnitt der Verbunddatenbank K10plus des GBV und des SWB mit für die Fernleihe und Direktlieferdienste relevanten Materialien.