Erscheinungsjahr
Medientyp
Datenquelle
Format
Lizenz
Synonyme wurden verwendet für: Sicherheit
Suche ohne Synonyme: keywords:(Sicherheit)
Verwendete Synonyme:
- safety
- security
-
Packet Loss Consideration for Burst-Based Anomaly Detection in SCADA Network
British Library Conference Proceedings | 2015|Schlagwörter: Computer security, Information security, Security applications -
The Unified Hardware Design for GCM and SGCM
British Library Conference Proceedings | 2015|Schlagwörter: Computer security, Information security, Security applications -
Improved Modular Multiplication for Optimal Prime Fields
British Library Conference Proceedings | 2015|Schlagwörter: Computer security, Information security, Security applications -
Systematically Breaking Online WYSIWYG Editors
British Library Conference Proceedings | 2015|Schlagwörter: Computer security, Information security, Security applications -
Name Server Switching: Anomaly Signatures, Usage, Clustering, and Prediction
British Library Conference Proceedings | 2015|Schlagwörter: Computer security, Information security, Security applications -
Reconstructing and Visualizing Evidence of Artifact from Firefox SessionStorage
British Library Conference Proceedings | 2015|Schlagwörter: Computer security, Information security, Security applications -
A Simple Yet Efficient Approach to Combat Transaction Malleability in Bitcoin
British Library Conference Proceedings | 2015|Schlagwörter: Computer security, Information security, Security applications -
Wireless Key Exchange Using Frequency Impairments
British Library Conference Proceedings | 2015|Schlagwörter: Computer security, Information security, Security applications -
AMAL: High-Fidelity, Behavior-Based Automated Malware Analysis and Classification
British Library Conference Proceedings | 2015|Schlagwörter: Computer security, Information security, Security applications -
I've Got Your Number: Harvesting Users' Personal Data via Contacts Sync for the KakaoTalk Messenger
British Library Conference Proceedings | 2015|Schlagwörter: Computer security, Information security, Security applications -
Joint Signature and Encryption in the Presence of Continual Leakage
British Library Conference Proceedings | 2015|Schlagwörter: Computer security, Information security, Security applications -
Analyzing Unnecessary Permissions Requested by Android Apps Based on Users' Opinions
British Library Conference Proceedings | 2015|Schlagwörter: Computer security, Information security, Security applications -
ADAM: Automated Detection and Attribution of Malicious Webpages
British Library Conference Proceedings | 2015|Schlagwörter: Computer security, Information security, Security applications -
Study on the Effectiveness of the Security Countermeasures Against Spear Phishing
British Library Conference Proceedings | 2015|Schlagwörter: Computer security, Information security, Security applications -
Fair Multi-signature
British Library Conference Proceedings | 2015|Schlagwörter: Computer security, Information security, Security applications -
Advanced Security Assessment for Control Effectiveness
British Library Conference Proceedings | 2015|Schlagwörter: Computer security, Information security, Security applications -
An Efficient Variant of Boneh-Gentry-Hamburg's Identity-Based Encryption Without Pairing
British Library Conference Proceedings | 2015|Schlagwörter: Computer security, Information security, Security applications -
Function Masking: A New Countermeasure Against Side Channel Attack
British Library Conference Proceedings | 2015|Schlagwörter: Computer security, Information security, Security applications -
Scalable and Autonomous Mobile Device-Centric Cloud for Secured D2D Sharing
British Library Conference Proceedings | 2015|Schlagwörter: Computer security, Information security, Security applications -
Defining Security Primitives for Eliciting Flexible Attack Scenarios Through CAPEC Analysis
British Library Conference Proceedings | 2015|Schlagwörter: Computer security, Information security, Security applications -
Successful Profiling Attacks with Different Measurement Environments for Each Phase
British Library Conference Proceedings | 2015|Schlagwörter: Computer security, Information security, Security applications -
Shared and Searchable Encrypted Data for Semi-trusted Servers with Controllable Sharing Property
British Library Conference Proceedings | 2015|Schlagwörter: Computer security, Information security, Security applications -
Context Based Smart Access Control on BYOD Environments
British Library Conference Proceedings | 2015|Schlagwörter: Computer security, Information security, Security applications -
Analyzing Security of Korean USIM-Based PKI Certificate Service
British Library Conference Proceedings | 2015|Schlagwörter: Computer security, Information security, Security applications -
Detection of Heap-Spraying Attacks Using String Trace Graph
British Library Conference Proceedings | 2015|Schlagwörter: Computer security, Information security, Security applications -
Multivariate Statistic Approach to Field Specifications of Binary Protocols in SCADA System
British Library Conference Proceedings | 2015|Schlagwörter: Computer security, Information security, Security applications -
A Trustless Broker Based Protocol to Discover Friends in Proximity-Based Mobile Social Networks
British Library Conference Proceedings | 2015|Schlagwörter: Computer security, Information security, Security applications -
Before Unrooting your Android Phone, Patching up Permission System First!
British Library Conference Proceedings | 2015|Schlagwörter: Computer security, Information security, Security applications -
Exploiting the Potential of GPUs for Modular Multiplication in ECC
British Library Conference Proceedings | 2015|Schlagwörter: Computer security, Information security, Security applications -
SecaaS Framework and Architecture: A Design of Dynamic Packet Control
British Library Conference Proceedings | 2015|Schlagwörter: Computer security, Information security, Security applications -
New Integrated Long-Term Glimpse of RC4
British Library Conference Proceedings | 2015|Schlagwörter: Computer security, Information security, Security applications -
A review of the literature on patient participation in transitions of the elderly
British Library Conference Proceedings | 2015|Schlagwörter: Patient safety, Healthcare safety -
`It's a State of Mind': a qualitative study after two years' experience with the World Health Organization's surgical safety checklist
British Library Conference Proceedings | 2015|Schlagwörter: Patient safety, Healthcare safety -
Development and validation of a taxonomy of adverse handover events in hospital settings
British Library Conference Proceedings | 2015|Schlagwörter: Patient safety, Healthcare safety -
Video-assisted surgery: suggestions for failure prevention in laparoscopic cholecystectomy
British Library Conference Proceedings | 2015|Schlagwörter: Patient safety, Healthcare safety -
Effects of trust in high-risk organizations during technological changes
British Library Conference Proceedings | 2015|Schlagwörter: Patient safety, Healthcare safety -
Standardisation and its discontents
British Library Conference Proceedings | 2015|Schlagwörter: Patient safety, Healthcare safety -
Task disengagement and implications for vigilance performance in CCTV surveillance
British Library Conference Proceedings | 2015|Schlagwörter: Patient safety, Healthcare safety -
A^2PG: alternative action plan generator
British Library Conference Proceedings | 2015|Schlagwörter: Patient safety, Healthcare safety -
Perspectives on healthcare safety and quality: selected papers from the 2nd Nordic Conference on Research in Patient Safety and Quality in Healthcare
British Library Conference Proceedings | 2015|Schlagwörter: Patient safety, Healthcare safety -
Development of instruments for assessment of individuals' and teams' non-technical skills in healthcare: a critical review
British Library Conference Proceedings | 2015|Schlagwörter: Patient safety, Healthcare safety -
Exploring gaps in cancer care using a systems safety perspective
British Library Conference Proceedings | 2015|Schlagwörter: Patient safety, Healthcare safety -
Improving the optical network rollout by means of knowledge-based techniques
British Library Conference Proceedings | 2015|Schlagwörter: Patient safety, Healthcare safety -
Danish cancer patients' perspective on health care: results from a national survey
British Library Conference Proceedings | 2015|Schlagwörter: Patient safety, Healthcare safety -
Use of the Global Trigger Tool in patient safety improvement efforts: Nordic experiences
British Library Conference Proceedings | 2015|Schlagwörter: Patient safety, Healthcare safety -
Asian food security; Towards Asia 2025; policy and technology imperatives. Summary of the main findings of the second international conference on Asian food security held in Singapore on 21-22 August 2014
British Library Conference Proceedings | 2015Schlagwörter: Food security -
Monitoring Database Access Constraints with an RBAC Metamodel: A Feasibility Study
British Library Conference Proceedings | 2015|Schlagwörter: Computer security -
Re-thinking Kernelized MLS Database Architectures in the Context of Cloud-Scale Data Stores
British Library Conference Proceedings | 2015|Schlagwörter: Computer security -
The Heavy Tails of Vulnerability Exploitation
British Library Conference Proceedings | 2015|Schlagwörter: Computer security -
Idea: Unwinding Based Model-Checking and Testing for Non-Interference on EFSMs
British Library Conference Proceedings | 2015|Schlagwörter: Computer security
Meine Suche schicken an (beta)
Schicken Sie ihre Suchanfrage (Suchterm ohne Filter) an andere Datenbanken, Portale und Kataloge, um ggf. weitere interessante Treffer zu finden:
Dimensions ist eine Datenbank für Abstracts und Zitate, die Informationen zu Forschungsförderungen mit daraus resultierenden Veröffentlichungen, Studien und Patenten verknüpft.
Im TIB AV-Portal können audiovisuelle Medien aus Wissenschaft und Lehre recherchiert und eigene wissenschaftliche Videos publiziert werden.
Im FID move kann nach fachspezifischer Literatur, Forschungsdaten und weitere Informationen aus der Mobilitäts- und Verkehrsforschung gesucht werden.
Der Open Research Knowledge Graph liefert strukturiert beschriebene Forschungsinhalte und macht diese vergleichbar.
Frei zugänglicher Ausschnitt der Verbunddatenbank K10plus des GBV und des SWB mit für die Fernleihe und Direktlieferdienste relevanten Materialien.