Erscheinungsjahr
Medientyp
Fach
Format
Lizenz
Sprache
Synonyme wurden verwendet für: Sicherheit
Suche ohne Synonyme: keywords:(Sicherheit)
Verwendete Synonyme:
- safety
- security
-
IT-Risikomanagement-Framework für den Einsatz von Cloud-Services in Kritischen Infrastrukturen
Springer Verlag | 2018|Schlagwörter: Systems and Data Security, Security -
Security Challenges in 5G-Based IoT Middleware Systems
Springer Verlag | 2016|Schlagwörter: Security Requirement, Security Architecture, Security Approach -
Exposing LTE Security Weaknesses at Protocol Inter-layer, and Inter-radio Interactions
Springer Verlag | 2018|Schlagwörter: LTE security, Systems and Data Security, Security -
Information Security in Software-Defined Network
Springer Verlag | 2020|Schlagwörter: SDN security, BGP security, Mobile and Network Security -
A Program Manipulation Middleware and Its Applications on System Security
Springer Verlag | 2018|Schlagwörter: System security, Systems and Data Security, Security -
Legacy-Compliant Data Authentication for Industrial Control System Traffic
Springer Verlag | 2017|Schlagwörter: Network security, Systems and Data Security, Security -
The Entity Labeling Pattern for Modeling Operating Systems Access Control
Springer Verlag | 2016|Schlagwörter: Security engineering, Security policies, Operating system security, Systems and Data Security -
Research on the Grouping Method of Side-Channel Leakage Detection
Springer Verlag | 2023|Schlagwörter: Systems and Data Security, Security Services, Mobile and Network Security -
Privacy Protection for Cloud‐Based Robotic Networks
Wiley | 2017|Schlagwörter: ad hoc network security, cloud robot security -
Defensive JavaScript. Building and Verifying Secure Web Components
Tema Archiv | 2014|Schlagwörter: Security-Komponente, Software-Security -
An Overview of Enhancing Encryption Standards for Multimedia in Explainable Artificial Intelligence Using Residue Number Systems for Security
Wiley | 2022|Schlagwörter: security -
A New Adaptative Security Protocol for UAV Network
Springer Verlag | 2016|Schlagwörter: Security architecture, Security protocol -
Conclusion: Future Trends and Challenges
Springer Verlag | 2017|Schlagwörter: Cyber security, Network security, Systems and Data Security, Security Science and Technology -
A Hybrid Approach for Protecting Mobile Agents Against Malicious Hosts
Springer Verlag | 2020|Schlagwörter: Mobility agent security, Routing security, Communication security -
A Scalable Honeynet Architecture for Industrial Control Systems
Springer Verlag | 2016|Schlagwörter: Industrial control system security, SCADA security, Systems and Data Security -
Comparative Analysis of Cloud Computing Security Frameworks for Financial Sector
Springer Verlag | 2021|Schlagwörter: Security framework, Cloud security, Cloud security reference model, Novel open security framework -
Towards Compromise
Wiley | 2016|Schlagwörter: security requirements, Canadian security intelligence service -
Security of IoT Application Layer: Requirements, Threats, and Solutions
Springer Verlag | 2023|Schlagwörter: Security, Security requirements -
Improved Interpolation-Based Reversible Audio Data Hiding Using Sample Dispersion and Value Shifting
Springer Verlag | 2022|Schlagwörter: Information security, Network security -
A Random Reversible Watermarking Scheme for Relational Data
Springer Verlag | 2023|Schlagwörter: Systems and Data Security, Security Services, Mobile and Network Security -
Security and Privacy in Vehicular Ad-Hoc Networks: Survey and the Road Ahead
Springer Verlag | 2013|Schlagwörter: Security, Systems and Data Security -
Illicit Blockchain Content: Its Different Shapes, Consequences, and Remedies
Springer Verlag | 2023|Schlagwörter: Security Services, Mobile and Network Security, Systems and Data Security -
Personalized Cryptographic Protocols - Obfuscation Technique Based on the Qualities of the Individual
Springer Verlag | 2021|Schlagwörter: Security protocols, User-oriented security systems -
Introduction
Wiley | 2022|Schlagwörter: wireless security, wireless communication network security, network security -
Security in Wireless Sensor Network Using IPsec
Springer Verlag | 2020|Schlagwörter: IPsec (Internet Protocol Security), SA (Security Association), SAD (Security Association Database), SPD (Security Policy Database), ESP (Encapsulating Security Payload) -
Smartphone Location Spoofing Attack in Wireless Networks
Springer Verlag | 2021|Schlagwörter: Location security, Systems and Data Security, Mobile and Network Security -
Network Time Protocol (NTPNetwork time protocol (NTP)) Security
Springer Verlag | 2021|Schlagwörter: NTP security, Mobile and Network Security, Systems and Data Security -
Maßnahmen einer IT-sicheren Beschaffung
Springer Verlag | 2017|Schlagwörter: Systems and Data Security, Security -
Requirements, Protocols, and Security Challenges in Wireless Sensor Networks: An Industrial Perspective
Springer Verlag | 2020|Schlagwörter: Security attacks, Security -
Allgemeines zum Beschaffungsprozess
Springer Verlag | 2017|Schlagwörter: Systems and Data Security, Security -
Internet Security Standards
Wiley | 2007|Schlagwörter: dialogue security, security threats, internet security standards -
Transport Layer Security Protocol
Springer Verlag | 2019|Schlagwörter: Security, Systems and Data Security -
Beschaffung von Hard- und Software mithilfe einer Beschaffungsplattform
Springer Verlag | 2017|Schlagwörter: Systems and Data Security, Security -
A Machine Learning Based Smartphone App for GPS Spoofing Detection
Springer Verlag | 2020|Schlagwörter: Security, Systems and Data Security, Mobile and Network Security -
Abschließende Bemerkungen
Springer Verlag | 2017|Schlagwörter: Systems and Data Security, Security -
An Effective Approach for Dealing with the Pressure to Compromise Security During Systems Development
Springer Verlag | 2018|Schlagwörter: Compromising security, Systems and Data Security, Security -
IoT Security Management: Model and Design Issues
Springer Verlag | 2020|Schlagwörter: Security, Security management, Dynamic security management -
LaaCan: A Lightweight Authentication Architecture for Vehicle Controller Area Network
Springer Verlag | 2020|Schlagwörter: In-vehicle network security, Systems and Data Security, Mobile and Network Security -
Secure CV2X Using COTS Smartphones over LTE Infrastructure
Springer Verlag | 2023|Schlagwörter: Systems and Data Security, Security Services, Mobile and Network Security
Meine Suche schicken an (beta)
Schicken Sie ihre Suchanfrage (Suchterm ohne Filter) an andere Datenbanken, Portale und Kataloge, um ggf. weitere interessante Treffer zu finden:
Dimensions ist eine Datenbank für Abstracts und Zitate, die Informationen zu Forschungsförderungen mit daraus resultierenden Veröffentlichungen, Studien und Patenten verknüpft.
Im TIB AV-Portal können audiovisuelle Medien aus Wissenschaft und Lehre recherchiert und eigene wissenschaftliche Videos publiziert werden.
Im FID move kann nach fachspezifischer Literatur, Forschungsdaten und weitere Informationen aus der Mobilitäts- und Verkehrsforschung gesucht werden.
Der Open Research Knowledge Graph liefert strukturiert beschriebene Forschungsinhalte und macht diese vergleichbar.
Frei zugänglicher Ausschnitt der Verbunddatenbank K10plus des GBV und des SWB mit für die Fernleihe und Direktlieferdienste relevanten Materialien.