Year of publication
Subject
Type of material
Licence
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
A Secure and Efficient V2V Authentication Method in Heavy Traffic Environment
Online Contents | 2016|Keywords: Vehicular security system, Security authentication, IoT security -
Security challenges with network functions virtualization
Elsevier | 2016|Keywords: Network security, Security threats -
Dataset to "Missed Opportunities: Measuring the Untapped TLS Support in the Industrial Internet of Things"
DataCite | 2021|Keywords: network security, security configuration -
Analysis of the physical layer security enhancing of wireless communication system under the random mobile
Free accessIET | 2019|Keywords: system security, physical layer security research, random mobile user physical layer security model, security of data, telecommunication security, artificial noise security scheme, physical layer security performance, physical layer security enhancing -
Applications and challenges of maintenance and safety engineering in industry 4.0
TIBKAT | 2020|Keywords: Industrial safety -
A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks
Elsevier | 2015|Keywords: Security Attacks -
When Agile Security Meets 5G
Free accessDOAJ | 2020|Keywords: 5G security, agile security, cloud security, security risk management -
Probabilistic yoking proofs for large scale IoT systems
Elsevier | 2015|Keywords: RFID security, IoT security -
Cloud security: Emerging threats and current solutions
Elsevier | 2016|Keywords: Cloud computing security, Security techniques -
On usage control for GRID systems
Elsevier | 2009|Keywords: Security policies, Grid security, Distributed systems security -
Simulation of transaction malleability attack for blockchain-based e-Voting
Elsevier | 2020|Keywords: Blockchain Security, Security Evaluation -
Analysis of the physical layer security enhancing of wireless communication system under the random mobile
Free accessWiley | 2019|Keywords: physical layer security research, artificial noise security scheme, physical layer security performance, security of data, system security, random mobile user physical layer security model, telecommunication security, physical layer security enhancing -
An empirical study on security expert ecosystem in the future IoT service environment
Elsevier | 2016|Keywords: Security ecosystem, Security expert -
Performance evaluation of the SRE and SBPG components of the IoT hardware platform security advisor framework
Elsevier | 2021|Keywords: IoT security, Security framework, IoT security requirements, IoT security best practices -
Analysis and Security Evaluation of Security Threat on Broadcasting Service
Online Contents | 2017|Keywords: Security, Security evaluation -
Multimodal layer surveillance map based on anomaly detection using multi‐agents for smart city security
Free accessWiley | 2022|Keywords: smart‐city security, security robot -
Understanding and overcoming cyber security anti-patterns
Elsevier | 2012|Keywords: Cyber security, Security controls, Security governance -
Software Defined Mobile Network Security
Wiley | 2015|Keywords: Security, Mobile network security, Security architecture -
Top Threats to Cloud: A Three-Dimensional Model of Cloud Security Assurance
Springer Verlag | 2021|Keywords: Cloud security model, Cloud security requirements, Cloud security threats, Cloud security vulnerabilities, Cloud security solution -
Towards fully verifiable forward secure privacy preserving keyword search for IoT outsourced data
Elsevier | 2021|Keywords: Cloud security, Forward security -
Continuity in Wireless Video Security System-Based Physical Security Services
Online Contents | 2013|Keywords: Security policy, Security service, Physical security, Video security system -
Scalable RFID security framework and protocol supporting Internet of Things
Elsevier | 2014|Keywords: Security protocol, Security framework -
AutoSecSDNDemo: Demonstration of automated end-to-end security in software-defined networks
Free accessFraunhofer Publica | 2016|Keywords: SDN security, end-to-end security, network security -
Security analysis of socio-technical physical systems
Elsevier | 2015|Keywords: Security assessment, Security model -
SecLooCI: A comprehensive security middleware architecture for shared wireless sensor networks
Elsevier | 2014|Keywords: Security middleware, Security -
LSC: Online auto-update smart contracts for fortifying blockchain-based log systems
Elsevier | 2019|Keywords: Blockchain security, Security dynamics -
Secured Model for Internet of Things (IoT) to Monitor Smart Field Data with Integrated Real-Time Cloud Using Lightweight Cryptography
Taylor & Francis Verlag | 2023|Keywords: IoT security, Security analysis -
Diagnostics of an output interface of a safety-related system with safety PLC
Online Contents | 2017|Keywords: Safety PLC, Safety integrity, Safety function -
Detecting Anonymising Proxy Usage on the Internet
Online Contents | 2013|Keywords: Security, Network security -
A framework for critical security factors that influence the decision of cloud adoption by Saudi government agencies
Elsevier | 2017|Keywords: Cloud security risks, Cloud security benefits -
Tips for Consumers: How to Travel Safely on the Information Superhighway
Springer Verlag | 2019|Keywords: Systems and Data Security, Crime Control and Security, Security Science and Technology, Security Services, Mobile and Network Security -
Physical Layer Security for UAV Communications
Wiley | 2020|Keywords: wireless network security, physical layer security, security breaches -
Matrix Profile data mining for BGP anomaly detection
Elsevier | 2024|Keywords: Cyber security, Internet security, Network security -
A Survey on the Cyber Security of Small-to-Medium Businesses: Challenges, Research Focus and Recommendations
Free accessDOAJ | 2022|Keywords: Cyber security, security posture, cyber security threats, cyber security frameworks, security and privacy -
Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies
TIBKAT | 2017|Keywords: Computer security, COMPUTERS ; Security ; General, Security measures, Computer networks ; Security measures -
Cross-plane colour image encryption using a two-dimensional logistic tent modular map
Elsevier | 2020|Keywords: Colour-image security, Image security -
Lightweight Cryptographic Techniques and Cybersecurity Approaches
Free accessGWLB - Gottfried Wilhelm Leibniz Bibliothek | 2022|Keywords: Network security -
Study on Information Security of Network-Based Manufacturing Environment
National licenceTrans Tech Publications | 2014|Keywords: Network Security, Security Management -
Lightweight Cryptographic Techniques and Cybersecurity Approaches
Free accessTIBKAT | 2022|Keywords: Network security -
Time-Delay Attacks in Network Systems
Springer Verlag | 2018|Keywords: Security, Crime Control and Security, Security Science and Technology -
Cyber-physical systems security: Limitations, issues and future trends
Elsevier | 2020|Keywords: Cyber-security threats, Security, Security and performance analysis -
A stochastic model of attack process for the evaluation of security metrics
Elsevier | 2013|Keywords: Cyber security, Security metrics, Quantitative security evaluation -
A Study on Smartwork Security Technology Based on Cloud Computing Environment
Online Contents | 2015|Keywords: Security analysis, Security element -
Influences on ICT teachers knowledge and routines in a technical e-safety context
Elsevier | 2017|Keywords: e-Safety, e-Safety behaviour -
Cryptography : Recent Advances and Future Developments
Free accessTIBKAT | 2021|Keywords: Network security -
A novel approach to manage cloud security SLA incidents
Elsevier | 2016|Keywords: Security SLAs, Cloud security -
A new method of evaluating robust power system security against uncertainties
Wiley | 2015|Keywords: probabilistic security assessment, power system security, deterministic security assessment -
Security Optimization of DF Relay Selection Strategy Under Outdated Scenarios
Online Contents | 2021|Keywords: Physical layer security, Security outage probability, Average security capacity
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.