Erscheinungsjahr
Medientyp
Datenquelle
Format
Lizenz
Sprache
Synonyme wurden verwendet für: Sicherheit
Suche ohne Synonyme: keywords:(Sicherheit)
Verwendete Synonyme:
- safety
- security
-
Dataset to "Missed Opportunities: Measuring the Untapped TLS Support in the Industrial Internet of Things"
DataCite | 2021|Schlagwörter: network security, security configuration -
Dataset to "Easing the Conscience with OPC UA: An Internet-Wide Study on Insecure Deployments"
DataCite | 2020|Schlagwörter: industrial communication; network security; security configuration -
Replication Package: "If You Can’t Get Them to the Lab: Evaluating a Virtual Study Environment with Security Information Workers"
DataCite | 2022|Schlagwörter: security, usable security, computer security -
Common evaluation pitfalls in touch-based authentication systems
Freier ZugriffBASE | 2021|Schlagwörter: Computer security -
Replication Package: "How Does Usable Security (Not) End Up in Software Products? Results From a Qualitative Interview Study"
DataCite | 2021|Schlagwörter: security, usable security -
Replication: An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery
DataCite | 2023|Schlagwörter: usable security, computer security -
Perception and practices of sharing access to data and devices in households
Freier ZugriffORKG Comparisons | 2022|Schlagwörter: Cryptography and Security -
Perception and practices of sharing access to data and devices in households
Freier ZugriffORKG Comparisons | 2022|Schlagwörter: Cryptography and Security -
Encryption for Controller Area Network
Freier ZugriffORKG Comparisons | 2022|Schlagwörter: Cryptography and Security -
Software-defined networking security solutions and requirements
Freier ZugriffORKG Comparisons | 2022|Schlagwörter: Cryptography and Security -
Comparison between the prevention and detection approaches for the high-rate DDoS attacks
Freier ZugriffORKG Comparisons | 2022|Schlagwörter: Security and Dependability -
Comparison of cybersecurity knowledge graphs
Freier ZugriffORKG Comparisons | 2023|Schlagwörter: Cryptography and Security -
Comparison between the mitigation approaches for the high-rate DDoS attacks in a cloud computing environment
Freier ZugriffORKG Comparisons | 2022|Schlagwörter: Security and Dependability -
The Quest to Replace Passwords
Freier ZugriffORKG Comparisons | 2023Schlagwörter: Cryptography and Security -
Comparison on Hack Tools and Properties Analysis
Freier ZugriffORKG Comparisons | 2023|Schlagwörter: Security and Dependability -
Models for collaborative access control
Freier ZugriffORKG Comparisons | 2023Schlagwörter: Security and Dependability -
Classical access control models
Freier ZugriffORKG Comparisons | 2023Schlagwörter: Cryptography and Security -
A comparison of security ontologies
Freier ZugriffORKG Comparisons | 2023Schlagwörter: Cryptography and Security -
Usability of access control
Freier ZugriffORKG Comparisons | 2023Schlagwörter: Cryptography and Security -
Comparison of cybersecurity knowledge graphs
Freier ZugriffORKG Comparisons | 2023|Schlagwörter: Cryptography and Security -
Comparison of software-based authentication mechanisms for the Internet of Drones (IoD)
Freier ZugriffORKG Comparisons | 2022|Schlagwörter: Cryptography and Security -
Comparative analysis of Internet of Medical Things (IoMT) security schemes
Freier ZugriffORKG Comparisons | 2022|Schlagwörter: Cryptography and Security -
Blockchain-based Access Management Mechanisms
Freier ZugriffORKG Comparisons | 2022|Schlagwörter: Cryptography and Security -
Authentication based on shared knowledge for socail acquaintances
Freier ZugriffORKG Comparisons | 2022Schlagwörter: Cryptography and Security -
CAN Bus IDS Comparison
Freier ZugriffORKG Comparisons | 2022|Schlagwörter: Security and Dependability -
Comparison of hardware-based authentication mechanisms for the Internet of Drones (IoD)
Freier ZugriffORKG Comparisons | 2022|Schlagwörter: Cryptography and Security -
Intrusion Detection Systems for Water Treatment and Distribution in Smart Cities
Freier ZugriffORKG Comparisons | 2022|Schlagwörter: Cryptography and Security -
Comparison of existing Intrusion Detection Systems (IDS) techniques in Wireless Sensor Networks (WSN) and Internet of Things (IoT)
Freier ZugriffORKG Comparisons | 2022|Schlagwörter: Cryptography and Security -
DDoS defense solutions in SDN (excluding AI, information theory methods)
Freier ZugriffORKG Comparisons | 2022|Schlagwörter: Security and Dependability -
Security solutions against web session attacks
Freier ZugriffORKG Comparisons | 2022|Schlagwörter: Security and Dependability -
Comparison of Machine Learning Algorithms for Intrusion Detection
Freier ZugriffORKG Comparisons | 2022Schlagwörter: Cryptography and Security -
A comparative analysis of blockchain-based security solutions for Internet of Medical Devices (IoMD).
Freier ZugriffORKG Comparisons | 2022Schlagwörter: Cryptography and Security -
CAN BUS IDS Comparison with Result
Freier ZugriffORKG Comparisons | 2022|Schlagwörter: Cryptography and Security -
Ontology-Based Anomaly Detection for Air Traffic Control Systems
Freier ZugriffORKG Comparisons | 2022|Schlagwörter: Cryptography and Security -
Comparison of the state-of-the-art chatbots features and applications
Freier ZugriffORKG Comparisons | 2022|Schlagwörter: Security and Dependability -
Deception techniques in computer security
Freier ZugriffORKG Comparisons | 2022|Schlagwörter: Security and Dependability -
Artificial Neural Network-based DDoS defence solutions in SDN
Freier ZugriffORKG Comparisons | 2022|Schlagwörter: Security and Dependability -
Machine learning-based DDoS defense solutions in SDN
Freier ZugriffORKG Comparisons | 2022|Schlagwörter: Security and Dependability -
Authentication for in-vehicle CAN communication
Freier ZugriffORKG Comparisons | 2022|Schlagwörter: Cryptography and Security -
IAM-based VS NFV-based implementations in Network Functions Virtualization
Freier ZugriffORKG Comparisons | 2022|Schlagwörter: Security and Dependability -
Information theory-based DDoS Defence solutions in SDN
Freier ZugriffORKG Comparisons | 2022|Schlagwörter: Security and Dependability -
Performance comparison between the state-of-the-art DDoS detection approaches in a cloud computing environment
Freier ZugriffORKG Comparisons | 2022|Schlagwörter: Security and Dependability -
Replication Package: "Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secret Information in Source Code Repositories"
DataCite | 2023|Schlagwörter: security, usable security, computer security -
Defeating Adversarial Attacks Againt Adversarial attacks in Network Security
Freier ZugriffBASE | 2022|Schlagwörter: network security, information security, machine learning security, deep learning security -
Evaluating Safety Buttons on Mobile Devices
Freier ZugriffBASE | 2018|Schlagwörter: safety apps, mobile safety applications, women's safety apps, public safety -
Angriffe auf Kraftfahrzeuge: Überblick und Klassifikation
Freier ZugriffDataCite | 2017|Schlagwörter: Automobiles; Security measures; Dataset, Automotive security
Meine Suche schicken an (beta)
Schicken Sie ihre Suchanfrage (Suchterm ohne Filter) an andere Datenbanken, Portale und Kataloge, um ggf. weitere interessante Treffer zu finden:
Dimensions ist eine Datenbank für Abstracts und Zitate, die Informationen zu Forschungsförderungen mit daraus resultierenden Veröffentlichungen, Studien und Patenten verknüpft.
Im TIB AV-Portal können audiovisuelle Medien aus Wissenschaft und Lehre recherchiert und eigene wissenschaftliche Videos publiziert werden.
Im FID move kann nach fachspezifischer Literatur, Forschungsdaten und weitere Informationen aus der Mobilitäts- und Verkehrsforschung gesucht werden.
Der Open Research Knowledge Graph liefert strukturiert beschriebene Forschungsinhalte und macht diese vergleichbar.
Frei zugänglicher Ausschnitt der Verbunddatenbank K10plus des GBV und des SWB mit für die Fernleihe und Direktlieferdienste relevanten Materialien.