Erscheinungsjahr
Fach
Format
Lizenz
TIB-Lesesaalbestand
LUH-Institutsbestand
Synonyme wurden verwendet für: Sicherheit
Suche ohne Synonyme: keywords:(Sicherheit)
Verwendete Synonyme:
- safety
- security
-
Practical Covertly Secure MPC for Dishonest Majority - Or: Breaking the SPDZ Limits
Tema Archiv | 2013|Schlagwörter: Sicherheit, aktive Sicherheit, beweisbare Sicherheit -
Enabling security functions with SDN: A feasibility study
Elsevier | 2015|Schlagwörter: Network security, Software-defined networking security, SDN security -
Apparatus: A framework for security analysis in internet of things systems
Elsevier | 2018|Schlagwörter: IoT Security, Security requirements, Smart cities security -
Denial of service attack detection through machine learning for the IoT
Freier ZugriffTaylor & Francis Verlag | 2020|Schlagwörter: security, network security -
The Security of Multiple Encryption in the Ideal Cipher Model
Tema Archiv | 2014|Schlagwörter: Sicherheit, beweisbare Sicherheit -
Impact of static and dynamic load models on security margin estimation methods
Elsevier | 2021|Schlagwörter: Dynamic security margins, Dynamic security limits, Security assessment, Security margin estimation -
Security and Privacy Service Level Agreement composition for Internet of Things systems on top of standard controls
Elsevier | 2022|Schlagwörter: Cloud security, IoT security, Security and privacy, Security SLA -
Novel security models, metrics and security assessment for maritime vessel networks
Elsevier | 2021|Schlagwörter: Security analysis, Security metrics, Security models -
A survey on registration hijacking attack consequences and protection for session initiation protocol (SIP)
Elsevier | 2020|Schlagwörter: Network security, Sip security -
The fast image encryption algorithm based on lifting scheme and chaos
Elsevier | 2020|Schlagwörter: Information security, Security analysis -
Model-based evaluation of combinations of Shuffle and Diversity MTD techniques on the cloud
Elsevier | 2019|Schlagwörter: Security analysis, Security metrics, Security modeling -
On the design of secure primitives for real world applications
Elsevier | 2020|Schlagwörter: Hardware security, Systems security, Security engineering, Computers and networks security -
Physical unclonable functions based secret keys scheme for securing big data infrastructure communication
Elsevier | 2019|Schlagwörter: IoT Security, Zigbee security, Hardware security -
A framework and tool for the assessment of information security risk, the reduction of information security cost and the sustainability of information security culture
Online Contents | 2021|Schlagwörter: Information security, Information security evaluation, The ARCS security framework, Information security culture, Information security assessment, Information security cost -
OSCAR: Object security architecture for the Internet of Things
Elsevier | 2014|Schlagwörter: Communication security, Object security, End-to-end security -
Government regulations in cyber security: Framework, standards and recommendations
Elsevier | 2018|Schlagwörter: Cyber security, Information security -
All-Or-Nothing data protection for ubiquitous communication: Challenges and perspectives
Elsevier | 2019|Schlagwörter: Data security, Multimedia security -
Security of Satellite-Terrestrial Communications: Challenges and Potential Solutions
Freier ZugriffDOAJ | 2022|Schlagwörter: Security, network security, satellite security, communications security, NTN security -
Role of Explainable AI in 6G Security*
Wiley | 2023|Schlagwörter: explainable security, AI security, 6G security, security of XAI -
Social network security: Issues, challenges, threats, and solutions
Elsevier | 2017|Schlagwörter: Security and privacy, Security threats -
Semantic security against web application attacks
Elsevier | 2013|Schlagwörter: Application security, Semantic security -
A Study on Acceptance Procedure Improvement of Web Application by Outsourcing for Mobile Service
Online Contents | 2016|Schlagwörter: Security architecture, Information security, Security management -
A machine-learning based probabilistic perspective on dynamic security assessment
Elsevier | 2020|Schlagwörter: Security Rules, Dynamic Security Assessment, Probabilistic Security Assessment -
Cyber security in the Smart Grid: Survey and challenges
Elsevier | 2012|Schlagwörter: Cyber security, Security protocols -
Network security assessment using a semantic reasoning and graph based approach
Elsevier | 2017|Schlagwörter: Network security, Security ontology -
Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation
Tema Archiv | 2013|Schlagwörter: Sicherheit, beweisbare Sicherheit -
MAPE-K/MAPE-SAC: An interaction framework for adaptive systems with security assurance cases
Elsevier | 2020|Schlagwörter: Security assurance cases, Security certification -
Blockchain‐Based Security Solutions for IoT Systems
Wiley | 2018|Schlagwörter: IoT security, security architecture, network security -
Experimental Study to Analyze the Security Performance in Wireless LANs
Online Contents | 2015|Schlagwörter: Security strength, Security protocols, WLAN security -
Systematic survey of advanced metering infrastructure security: Vulnerabilities, attacks, countermeasures, and future vision
Elsevier | 2022|Schlagwörter: Security vulnerability, Security threat, Security attack -
Cloud security engineering: Early stages of SDLC
Elsevier | 2016|Schlagwörter: Cloud security, Security vulnerabilities -
TARP: Ticket-based address resolution protocol
Elsevier | 2007|Schlagwörter: Network security, ARP security -
A new unified image encryption algorithm based on a lifting transformation and chaos
Elsevier | 2020|Schlagwörter: Information security, Security analysis -
Swarm Intelligence inspired Intrusion Detection Systems — A systematic literature review
Elsevier | 2021|Schlagwörter: Network security, Data security -
Limits of Provable Security for Homomorphic Encryption
Tema Archiv | 2013|Schlagwörter: Sicherheit, beweisbare Sicherheit -
A Study on Financing Security for Smartphones Using Text Mining
Online Contents | 2017|Schlagwörter: Smartphone security, Security, Smartphone financing security -
The area-efficient gate level information flow tracking schemes of digital circuit with multi-level security lattice
Elsevier | 2023|Schlagwörter: Hardware security, Security lattice, Security label -
Metaverse intrusion detection of wormhole attacks based on a novel statistical mechanism
Elsevier | 2023|Schlagwörter: IoT security, Network security, Mobile cloud security, Security for Metaverse, Virtualization security, Cyber-Physical security -
A Dynamic Tradeoff between Active and Passive Corruptions in Secure Multi-Party Computation
Tema Archiv | 2013|Schlagwörter: passive Sicherheit, aktive Sicherheit -
An architecture to manage security operations for digital service chains
Elsevier | 2020|Schlagwörter: Cyber-security paradigms, Security architectures -
Hardware/software security co-verification and vulnerability detection: An information flow perspective
Elsevier | 2023|Schlagwörter: Hardware and software security co-verification, Information flow security, Security model, Security property -
State of Art of Security and Risk in Wireless Environment Along with Healthcare Case Study
Wiley | 2023|Schlagwörter: cyber security, security attacks, security models, security & privacy -
Cloud Security Threats and Solutions: A Survey
Online Contents | 2022|Schlagwörter: Security techniques, Cyber-security, Cloud security and threats -
A framework for enhancing mobile workflow execution through injection of flexible security controls
Online Contents | 2018|Schlagwörter: Security injection, Security controls, Security modeling -
On the Feasibility of Extending Oblivious Transfer
Tema Archiv | 2013|Schlagwörter: Sicherheit, statische Sicherheit -
Security Infrastructure for Cyber Attack Targeted Networks and Services
Springer Verlag | 2022|Schlagwörter: Security and protection, Network security, Server security, Cloud security, Device security, Security services, Infrastructure security -
Critical analysis of the layered and systematic approaches for understanding IoT security threats and challenges
Elsevier | 2022|Schlagwörter: IoT security, IoT ecosystem security, Security requirements -
A sentence-level text adversarial attack algorithm against IIoT based smart grid
Elsevier | 2021|Schlagwörter: IIoT security, Smart grid security -
Provably Secure Higher-Order Masking of AES
Tema Archiv | 2011|Schlagwörter: physikalische Security, Sicherheit, beweisbare Sicherheit
Meine Suche schicken an (beta)
Schicken Sie ihre Suchanfrage (Suchterm ohne Filter) an andere Datenbanken, Portale und Kataloge, um ggf. weitere interessante Treffer zu finden:
Dimensions ist eine Datenbank für Abstracts und Zitate, die Informationen zu Forschungsförderungen mit daraus resultierenden Veröffentlichungen, Studien und Patenten verknüpft.
Im TIB AV-Portal können audiovisuelle Medien aus Wissenschaft und Lehre recherchiert und eigene wissenschaftliche Videos publiziert werden.
Im FID move kann nach fachspezifischer Literatur, Forschungsdaten und weitere Informationen aus der Mobilitäts- und Verkehrsforschung gesucht werden.
Der Open Research Knowledge Graph liefert strukturiert beschriebene Forschungsinhalte und macht diese vergleichbar.
Frei zugänglicher Ausschnitt der Verbunddatenbank K10plus des GBV und des SWB mit für die Fernleihe und Direktlieferdienste relevanten Materialien.