Year of publication
Type of media
Subject
Type of material
Licence
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
A Survey on Systems Security Metrics
Online Contents | 2017|Keywords: quantitative security, Security metrics, security foundation, security measurement -
The design of phishing studies: Challenges for researchers
Elsevier | 2015|Keywords: Information security, Security behaviours, Email security, Security training -
From information security to cyber security
Elsevier | 2013|Keywords: Information security, Cyber security, Cyber-Security, Computer security -
The Human Aspects of Information Security Questionnaire (HAIS-Q): Two further validation studies
Elsevier | 2017|Keywords: Information security (InfoSec), Security behaviours, Cyber security, Information security awareness (ISA) -
Novel efficient techniques for real-time cloud security assessment
Elsevier | 2016|Keywords: Cloud security, Security quantification, Security evaluation, Security level agreements, Security metrics -
Cyber ranges and security testbeds: Scenarios, functions, tools and architecture
Elsevier | 2019|Keywords: Security testbed, Cyber security, Security exercise -
Security threats to critical infrastructure: the human factor
Free accessOnline Contents | 2018|Keywords: Security awareness, Cyber security training, Security threats against critical infrastructure, Critical infrastructure security, Work-based security training -
The significance of securing as a critical component of information security: An Australian narrative
Elsevier | 2019|Keywords: Security studies, Usable security, Information security messaging, Ontological security, Information security management -
Enabling security functions with SDN: A feasibility study
Elsevier | 2015|Keywords: Network security, Software-defined networking security, SDN security -
A comprehensive model of information security factors for decision-makers
Elsevier | 2020|Keywords: Key Security Indicators, Security Success, Security Model, Security Management Decision-Making -
Security threats to critical infrastructure: the human factor
Online Contents | 2018|Keywords: Security awareness, Cyber security training, Security threats against critical infrastructure, Critical infrastructure security, Work-based security training -
“Security begins at home”: Determinants of home computer and mobile device security behavior
Elsevier | 2017|Keywords: Behavioral IS security, Information security, Mobile device security, Home computer security -
Security-related behavior in using information systems in the workplace: A review and synthesis
Elsevier | 2012|Keywords: Information security, Security-related behavior, Security assurance behavior, Security risk-taking behavior, Security damaging behavior, Security violation -
A novel Security-by-Design methodology: Modeling and assessing security by SLAs with a quantitative approach
Elsevier | 2020|Keywords: Security-by-Design methodologies, Security Service Level Agreement, Security metrics, Security models, Security Assessment -
More than the individual: Examining the relationship between culture and Information Security Awareness
Elsevier | 2019|Keywords: Security culture, Information Security Awareness (ISA), Information Security (InfoSec), Cyber security -
Cloud security issues and challenges: A survey
Elsevier | 2016|Keywords: Cloud security, Cloud security challenges, Cloud security issues -
Security of Software Defined Networks: A survey
Elsevier | 2015|Keywords: Security, Software Defined Security, Network security -
The legal issues of the substantiation of new types of national security
Free accessDOAJ | 2020|Keywords: security, national security, national security strategy, types of national security, moral security, cultural security -
The prospects of easier security for small organisations and consumers
Elsevier | 2015|Keywords: Data security, Information security, Baseline security, Security profile -
Security in agile software development: A practitioner survey
Elsevier | 2020|Keywords: Security engineering, Software security, Security standards, Security assurance -
Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q)
Elsevier | 2013|Keywords: Information security, Security behaviours, Cyber security -
Survey on cyberspace security
Online Contents | 2015|Keywords: information security, information system security, cyberspace security, network security, information content security -
The nature of security: A conceptual framework for integral-comprehensive modeling of IT security and cybersecurity
Elsevier | 2022|Keywords: Information security, Security framework, Security architecture, Security model, Security relationship, Security chain -
Information security policy noncompliance: An integrative social influence model
Wiley | 2020|Keywords: information security management, IS Security, security policy violation -
Information security policies’ compliance: a perspective for higher education institutions
Taylor & Francis Verlag | 2020|Keywords: Information security policies’ compliance, information security culture, information security management, information security awareness, computer and information systems security -
Determinants of early conformance with information security policies
Elsevier | 2017|Keywords: Information security, Perceived security threat, Mandatory security policies, Information security awareness -
Incident response teams – Challenges in supporting the organisational security function
Elsevier | 2012|Keywords: Information security, Security management, Security models, Security learning -
Security in Software-Defined Networking: Threats and Countermeasures
Online Contents | 2016|Keywords: Security countermeasures, Security -
Prevention is better than cure! Designing information security awareness programs to overcome users' non-compliance with information security policies in banks
Elsevier | 2017|Keywords: Information security awareness, Information security awareness programs, Information security compliance, Information security policy -
A study on security strategy in ICT convergence environment
Online Contents | 2014|Keywords: Security advancement step, Security level, Security characteristic, Security strategy -
Apparatus: A framework for security analysis in internet of things systems
Elsevier | 2018|Keywords: IoT Security, Security requirements, Smart cities security -
A standard for developing secure mobile applications
Elsevier | 2013|Keywords: Mobile device security, Mobile application security, Application security, Cyber security -
College students information security awareness: a comparison between smartphones and computers
Online Contents | 2020|Keywords: Computer security, Smartphone information security awareness, Information security awareness, Information security knowledge -
Delegate the smartphone user? Security awareness in smartphone platforms
Elsevier | 2012|Keywords: Security awareness, Security survey, Smartphone security -
Information Security and People: A Conundrum for Compliance
Free accessBASE | 2017|Keywords: security compliance, security management, end user security behaviour -
Ontology for attack detection: An intelligent approach to web application security
Elsevier | 2014|Keywords: Web application security, Semantic security, Cyber security, Information security -
Exporting decentred security governance: the tensions of security sector reform
Taylor & Francis Verlag | 2016|Keywords: security sector reform, security governance, security/development -
Information security policy development and implementation: The what, how and who
Elsevier | 2016|Keywords: Security policy development, Security policy implementation, Security policy life cycle, Security policy management -
Denial of service attack detection through machine learning for the IoT
Free accessTaylor & Francis Verlag | 2020|Keywords: security, network security -
Applications of social network analysis in behavioural information security research: Concepts and empirical analysis
Elsevier | 2017|Keywords: Information security behaviour, Information security compliance, Information security management, Information security governance -
ASE: A comprehensive pattern-driven security methodology for distributed systems
Elsevier | 2015|Keywords: Security methodologies, Distributed systems security, Security patterns, Security solution frames -
A situation awareness model for information security risk management
Elsevier | 2014|Keywords: Information security management, Information security risk management, Information security intelligence, Information security compliance, Information security investigation, Evidence-based information security -
Information security assessment in public administration
Elsevier | 2019|Keywords: Information security, Information security assessment, Information security management -
Information security: The moving target
Elsevier | 2008|Keywords: Information security, Information security topics, Information security trends, Security breaches, Security journals -
Cyber Security Challenges & Their Solutions in India
Free accessBASE | 2022|Keywords: security systems, cyber security, security tools -
Security and Privacy Service Level Agreement composition for Internet of Things systems on top of standard controls
Elsevier | 2022|Keywords: Cloud security, IoT security, Security and privacy, Security SLA -
A unified framework for cloud security transparency and audit
Elsevier | 2020|Keywords: Security audit, Cloud security transparency, Security requirements -
How does overconfidence affect information security investment and information security performance?
Taylor & Francis Verlag | 2021|Keywords: Information security, information security investment, information security performance -
Quality of security metrics and measurements
Elsevier | 2013|Keywords: Security metrics, Security quantification, Quality of security metrics, Security effectiveness
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.