Year of publication
Type of media
Source
Type of material
Licence
Language
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Improving software security awareness using a serious game
Free accessIET | 2018|Keywords: security related scenarios, security education, software security awareness, security of data, Cyber Security-Requirements Awareness Game -
Analysis of the physical layer security enhancing of wireless communication system under the random mobile
Free accessIET | 2019|Keywords: system security, physical layer security research, random mobile user physical layer security model, security of data, telecommunication security, artificial noise security scheme, physical layer security performance, physical layer security enhancing -
Multi-objective evolutionary approach to select security solutions
Free accessIET | 2017|Keywords: security issues, optimised security method, efficient security solutions, security methods -
Physical layer security with dynamic behaviour cooperator based on coalitional game
Free accessIET | 2014|Keywords: physical layer security, original security transmission condition, maximum PHY security capacity, security of data -
Safety and security risk assessment in cyber-physical systems
Free accessIET | 2019|Keywords: security-critical system, security risk assessment, safety incidents, security attacks, security of data, safety-critical system -
Physical-layer security in Internet of Things based on compressed sensing and frequency selection
Free accessIET | 2017|Keywords: physical layer security, security method, CS security model, telecommunication security, information security -
Distribution network reconfiguration comprehensively considering N−1 security and network loss
Free accessIET | 2018|Keywords: N−1 security criterion, N−1 security margin, power system security, distribution system security region, security margin constraints -
Mitigating application layer distributed denial of service attacks via effective trust management
IET | 2010|Keywords: telecommunication security, security of data -
Critical survey of existing publicly verifiable secret sharing schemes
IET | 2012|Keywords: security of data -
Approaching secure industrial control systems
Free accessIET | 2015|Keywords: security cost estimation, security of data, security programme, information security assurance activities, security assessment scheme -
Physical unclonable function: architectures, applications and challenges for dependable security
Free accessIET | 2020|Keywords: dependable security, security solutions, security of data, hardware-specific security primitive, desired security levels, telecommunication security -
Power maximisation technique for generating secret keys by exploiting physical layer security in wireless communication
Free accessIET | 2020|Keywords: secret key based security, physical layer security, communication security, keyless security, telecommunication security, secret key-based security -
Security analysis of cyber-physical systems using $\mathcal {H}_2$H2 norm
Free accessIET | 2017|Keywords: security index, security analysis, power system security, security of data -
SACK2: effective SYN flood detection against skillful spoofs
IET | 2012|Keywords: computer network security -
Passenger acceptance of counter-terrorism security measures in stations
Free accessIET | 2016|Keywords: individual passenger security screening methods, security, counter terrorism security -
An adaptive distributed certificate management scheme for space information network
Free accessIET | 2013|Keywords: security vulnerability, security requirements, security mechanisms, security risks -
ASCAA: API-level security certification of android applications
Free accessIET | 2017|Keywords: security threat identification, ASCAA Security Language, API-level security certification-of-Android applications, security threat analysis, requirement-dependent security rules, security threats -
Light-weight framework for security-sensitive wireless sensor networks applications
Free accessIET | 2013|Keywords: security-sensitive wireless sensor networks applications, security framework, security-sensitive WSN, security-sensitive WSN applications, security, telecommunication security -
Secrets of the data stream [security system]
IET | 2010|Keywords: telecommunication security, security of data
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.