Year of publication
Type of material
Licence
Language
TIB reading rooms collection
LUH institutes collection
Synonyms were used for: SICHERHEIT
Search without synonyms: keywords:(SICHERHEIT)
Used synonyms:
- safety
- security
-
Robustness of Affine and Extended Affine Equivalent Surjective S-Box(es) Against Differential Cryptanalysis
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Towards Characterizing IoT Software Update Practices
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Foundations and practice of security : 15th International Symposium, FPS 2022, Ottawa, ON, Canada, December 12-14, 2022 : revised selected papers
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
CHIEFS: Corneal-Specular Highlights Imaging for Enhancing Fake-Face Spotter
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Towards a Maturity Model for Crypto-Agility Assessment
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
A Decision-Support Tool for Experimentation on Zero-Hour Phishing Detection
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Reducing Trust Assumptions with OSCORE, RISC-V, and Layer 2 One-Time Passwords
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Whiteboxgrind — Automated Analysis of Whitebox Cryptography
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Removing the Field Size Loss from Duc et al.’s Conjectured Bound for Masked Encodings
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Reducing the Cost of Machine Learning Differential Attacks Using Bit Selection and a Partial ML-Distinguisher
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
SCADA Radio Blackbox Reverse Engineering
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Automating Device Fingerprinting Attacks in 4G and 5G NSA Mobile Networks
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Two-Layer Architecture for Signature-Based Attacks Detection over Encrypted Network Traffic
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Money Transfer on Transaction Signature-Based Ledger
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
On the Feasibility of Single-Trace Attacks on the Gaussian Sampler Using a CDT
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Data-Driven Evaluation of Intrusion Detectors: A Methodological Framework
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Deep-Learning-Based Vulnerability Detection in Binary Executables
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
If-This-Then-Allow-That (to Phone Home): A Trigger-Based Network Policy Enforcement Framework for Smart Homes
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Science of cyber security : 5th international conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023 : proceedings
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security -
16th International Probabilistic Safety Assessment and Management Conference 2022 (PSAM 16) : Honolulu, Hawaii, USA, 26 June-1 July 2022 / International Association for Probabilistic Safety Assessment and Management (IAPSAM), European Safety and Reliability Association (ESRA) ; Volume 2 of 3
TIBKAT | 2023|Keywords: Sicherheit
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.