Year of publication
Type of media
Source
Subject
Type of material
Licence
Language
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Physical unclonable function: architectures, applications and challenges for dependable security
Free accessIET | 2020|Keywords: dependable security, security solutions, security of data, hardware-specific security primitive, desired security levels, telecommunication security -
Power maximisation technique for generating secret keys by exploiting physical layer security in wireless communication
Free accessIET | 2020|Keywords: secret key based security, physical layer security, communication security, keyless security, telecommunication security, secret key-based security -
Cyber security threats, challenges and defence mechanisms in cloud computing
Free accessIET | 2020|Keywords: severe security, cyber security threats, security of data -
Research on distributed blockchain-based privacy-preserving and data security framework in IoT
Free accessIET | 2020|Keywords: distributed blockchain-based security architecture, corresponding security problems, data security framework -
Dimension of distribution system security region: concept, calculation and application
Free accessIET | 2020|Keywords: security boundaries, power system security, distribution system security region -
Cryptanalysis and improvement of a user authentication scheme for wireless sensor networks using chaotic maps
Free accessIET | 2020|Keywords: security features, formal security analysis, telecommunication security -
Study on attack paths of cyber attack in cyber-physical power systems
Free accessIET | 2020|Keywords: computer network security, security stability control system, power system security, telecommunication security -
Random linear network coding based physical layer security for relay-aided device-to-device communication
Free accessIET | 2020|Keywords: network security, physical layer security design, telecommunication security -
Critical nodes identification for vulnerability analysis of power communication networks
Free accessIET | 2020|Keywords: security of data, telecommunication security -
Use of performance indices for contingency screening for rapid assessment of dynamic security region
Free accessIET | 2020|Keywords: dynamic security region, power system security -
Fast dynamic voltage security margin estimation: concept and development
Free accessIET | 2020|Keywords: fast dynamic voltage security margin estimation, power system security, static voltage security margin -
Enhancing multi-tenancy security in the cloud computing using hybrid ECC-based data encryption approach
Free accessIET | 2020|Keywords: two-layer security, multilevel security, security analysis, multitenancy security enhancement -
Physical layer security in space-time block codes from coordinate interleaved orthogonal design
Free accessIET | 2020|Keywords: telecommunication security, PHY security metrics, physical layer security performance -
Incremental broad learning for real-time updating of data-driven power system dynamic security assessment models
Free accessIET | 2020|Keywords: data-driven power system dynamic security assessment models, power system security, data-driven dynamic security assessment model -
Hybrid data-driven physics model-based framework for enhanced cyber-physical smart grid security
Free accessIET | 2020|Keywords: smart grids cyber-physical security, security of data, power system security, telecommunication security -
Fast identifying redundant security constraints in SCUC in the presence of uncertainties
Free accessIET | 2020|Keywords: power system security, security constrained unit commitment, redundant security constraints -
Distributed mitigation of content pollution in peer-to-peer video streaming networks
Free accessIET | 2020|Keywords: computer network security, security vulnerability -
Energy efficient aggregation technique-based realisable secure aware routing protocol for wireless sensor network
Free accessIET | 2020|Keywords: informal security analysis, formal security analysis, telecommunication security, security aspects -
Credibility-based secure distributed load frequency control for power systems under false data injection attacks
Free accessIET | 2020|Keywords: power system security, security of data, telecommunication security -
Optimal scheduling of reconfigurable grids considering dynamic line rating constraint
Free accessIET | 2020|Keywords: Security-Constrained Unit Commitment, system security, power system security, security constraint
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.