Year of publication
Type of material
Licence
Language
TIB reading rooms collection
LUH institutes collection
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Enhancing SOC threat detection and classification with ML ; Melhorando a deteção e classificação de ameaças no SOC com ML
Free accessBASE | 2026|Keywords: Security Operation Centers, Security information and event management, Cyber security -
Secure software development life cycle ; Ciclo seguro de desenvolvimento de software
Free accessBASE | 2026|Keywords: Security -
Exploring hybrid security strategies in Ghana: State and private sector partnerships
Taylor & Francis Verlag | 2024|Keywords: Private security, state security, security partnership, security actors -
Artificial Intelligence for Cyber Security
Current Trends and Future ChallengesWiley | 2024|Keywords: Computer network security, information security, cyber security, application security, artificial intelligence‐based cyber security -
Understanding safety engineering practice: Comparing safety engineering practice as desired, as required, and as observed
Elsevier | 2024|Keywords: Safety practice, Safety framework, Safety process, Safety lifecycle, Safety improvements -
CPS4CIP 2023
TIBKAT | 2024Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
DPM 2023
TIBKAT | 2024Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
TAURIN 2023
TIBKAT | 2024Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Exploring the role of assurance context in system security assurance evaluation: a conceptual model
Emerald Group Publishing | 2024|Keywords: Security assurance, Security evaluation, System security -
SECPRE 2023
TIBKAT | 2024Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Computer security ; Part 2: CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AL, and SECAI
TIBKAT | 2024|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
SECAL 2023
TIBKAT | 2024Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
PriST-AI 2023
TIBKAT | 2024Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
SecAssure 2023
TIBKAT | 2024Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
CBT 2023
TIBKAT | 2024Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
ADIoT 2023
TIBKAT | 2024Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
CyberICPS 2023
TIBKAT | 2024Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
WASP 2023
TIBKAT | 2024Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Computer security ; Part 1: CyberICS, DPM, CBT, and SECPRE
TIBKAT | 2024|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Foundations and practice of security / Mohamed Mosbah, Florence Sèdes, Nadia Tawbi, Toufik Ahmed, Nora Boulahia-Cuppens, Joaquin Garcia-Alfaro editors ; Part 2
TIBKAT | 2024|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Ontology-Based Metrics Computation for System Security Assurance Evaluation
Free accessTaylor & Francis Verlag | 2024|Keywords: System security, security assurance, security metrics -
Cybercrime in India: An analysis of crime against women in ever expanding digital space
Wiley | 2024|Keywords: communication security, information security -
A multi-group assessment of safety culture among engineering students in the United Arab Emirates
Emerald Group Publishing | 2024|Keywords: Safety culture, Safety behavior, Safety awareness, Safety attitude -
Cloud and Edge Networking Security
Wiley | 2024|Keywords: cloud networking security, edge networking security, security cloud, SIM‐based security -
Examining the need for a high level of therapeutic security at a regional forensic mental health service in Aotearoa New Zealand
Taylor & Francis Verlag | 2024|Keywords: therapeutic security, high security, relational security, procedural security, physical security -
Key based secured cryptosystems used for online data sharing on the cloud
American Institute of Physics | 2024|Keywords: SECURITY -
High performance packet classification algorithm for network security systems using modified grid-of-tries
American Institute of Physics | 2024|Keywords: SECURITY -
Risk based inspection and maintenance strategy for subsea pipelines using Bayesian influence diagram
American Institute of Physics | 2024|Keywords: SECURITY -
Enhancement of KASUMI algorithm by adding hamming code
American Institute of Physics | 2024|Keywords: SECURITY -
A low-cost multi-agent system for physical security in smart buildings
American Institute of Physics | 2024|Keywords: SECURITY -
Security from Legacy Wireless Systems to 5G Networks
Wiley | 2024|Keywords: security attacks, security services, wireless network security, wireless security architectures -
Employees’ BYOD Security Policy Compliance in the Public Sector
Taylor & Francis Verlag | 2024|Keywords: Security policy compliance, BYOD security policy, security culture, public sector security policy, security training and awareness -
Machine learning for cyber security : 5th International Conference, ML4CS 2023, Yanuca Island, Fiji, December 4-6, 2023 : proceedings
TIBKAT | 2024|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
UpCy: Safely Updating Outdated Dependencies (Summary)
DataCite | 2024|Keywords: Security maintenance, Security Vulnerabilities -
The Arctic as a regional security complex
Taylor & Francis Verlag | 2024|Keywords: regional security complex, security -
Intelligence oversight in times of transnational impunity : who will watch the watchers?
Free accessTIBKAT | 2024|Keywords: Internal security, National security, POLITICAL SCIENCE / Political Freedom & Security / Human Rights, POLITICAL SCIENCE / Political Freedom & Security / International Security, POLITICAL SCIENCE / Political Freedom & Security / Intelligence -
Cyber security using modern technologies : artificial intelligence, blockchain and quantum cryptography
TIBKAT | 2024|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Navigating leadership styles through qualitative exploration for enhanced safety in the construction sector
Elsevier | 2024|Keywords: Safety leadership, Safety leadership styles, Safety climate, Safety performance -
Role of data security technology in healthcare in protecting confidential patient information and complying with regulations
American Institute of Physics | 2024|Keywords: CYBER SECURITY -
Wannacry ransomware attack: The enemy lies under your blanket
American Institute of Physics | 2024|Keywords: NETWORK SECURITY -
Dark Clouds on the Horizon? Effects of Cloud Storage on Security Breaches
Taylor & Francis Verlag | 2024|Keywords: Cloud Security, Security Breaches -
Matrix Profile data mining for BGP anomaly detection
Elsevier | 2024|Keywords: Cyber security, Internet security, Network security -
Ethereum smart contract security: Design, risks and protection approaches
American Institute of Physics | 2024|Keywords: CYBER SECURITY -
Deepfake impact, security threats and potential preventions
American Institute of Physics | 2024|Keywords: NETWORK SECURITY -
Data protection in IoT using CoAP based on enhanced DTLS
American Institute of Physics | 2024|Keywords: CYBER SECURITY -
Web-based biometric authentication system for web applications (WBAS)
American Institute of Physics | 2024|Keywords: NETWORK SECURITY -
Service centric attribute based block level two step encryption scheme for improved cloud security
American Institute of Physics | 2024|Keywords: CYBER SECURITY -
Comparative study of computer security methodologies for countering cyber attacks
American Institute of Physics | 2024|Keywords: CYBER SECURITY -
EFTS: An encryption file transfer system applying advanced encryption standard (AES) algorithm
American Institute of Physics | 2024|Keywords: NETWORK SECURITY
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.