Year of publication
Subject
Type of material
Licence
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Security from Legacy Wireless Systems to 5G Networks
Wiley | 2024|Keywords: security attacks, security services, wireless network security, wireless security architectures -
Matrix Profile data mining for BGP anomaly detection
Elsevier | 2024|Keywords: Cyber security, Internet security, Network security -
Have our backs‐medical‐surgical nurses’ safety culture experiences: An inductive qualitative descriptive study
Free accessWiley | 2024|Keywords: patient safety, safety culture -
HTTP header based phishing attack detection using machine learning
Wiley | 2024|Keywords: Cyber Security, Security and Privacy -
Influence of Geomagnetic Storms on Power System Static Voltage Security
Elsevier | 2024|Keywords: Probabilistic security assessment, Steady-state security regions, Steady-State Security Distance -
Data Center Facilities
Springer Verlag | 2024|Keywords: Systems and Data Security, Security Services, Mobile and Network Security -
Enhancing Security and Ownership Protection of Neural Networks Using Watermarking Techniques: A Systematic Literature Review Using PRISMA
Springer Verlag | 2024|Keywords: Security and ownership protection, Systems and Data Security, Security Services, Principles and Models of Security, Mobile and Network Security -
Contemporary Improvements in Enhancing the Watermarking Techniques: A Deep Perspective
Springer Verlag | 2024|Keywords: Systems and Data Security, Security Services, Principles and Models of Security, Mobile and Network Security -
Role of Blockchain and Watermarking Toward Cybersecurity
Springer Verlag | 2024|Keywords: Systems and Data Security, Security Services, Principles and Models of Security, Mobile and Network Security -
Intelligence and Protection of Key (Critical) Infrastructure Objects
Springer Verlag | 2024|Keywords: Security, Security Science and Technology, Systems and Data Security -
Privacy‐preserving data integration scheme in industrial robot system based on fog computing and edge computing
Free accessDOAJ | 2024|Keywords: computer network security, security of data -
Open Issues and Future Research Directions for Security and Privacy in 5G Networks
Wiley | 2024|Keywords: 5G wireless security, physical layer security, security management -
Security Mechanisms in 5G Wireless Systems
Wiley | 2024|Keywords: physical layer security, security mechanisms, security services -
A Study on Security Protocols, Threats and Probable Solutions for Internet of Things Using Blockchain
Wiley | 2024|Keywords: blockchain security, security solutions, security threats -
The Impact of Denoising in Watermarking Robustness
Springer Verlag | 2024|Keywords: Systems and Data Security, Security Services, Principles and Models of Security, Mobile and Network Security -
Digital Watermarking: Pathway to Secure!
Springer Verlag | 2024|Keywords: Systems and Data Security, Security Services, Principles and Models of Security, Mobile and Network Security -
Resilient Operations
Springer Verlag | 2024|Keywords: Security Science and Technology, Systems and Data Security -
Cyber Resilience Fundamentals
Springer Verlag | 2024|Keywords: Security Science and Technology, Systems and Data Security -
Survey of research on confidential computing
Free accessDOAJ | 2024|Keywords: computer network security, security of data -
Introduction
Springer Verlag | 2024|Keywords: Security Science and Technology, Systems and Data Security -
Testing and Improving Cyber Resilience
Springer Verlag | 2024|Keywords: Security Science and Technology, Systems and Data Security -
A Watermark Challenge: Synthetic Speech Detection
Springer Verlag | 2024|Keywords: Systems and Data Security, Security Services, Principles and Models of Security, Mobile and Network Security -
Secured Digital Watermarking Using Neural Networks
Springer Verlag | 2024|Keywords: Systems and Data Security, Security Services, Principles and Models of Security, Mobile and Network Security -
VoWi‐Fi security threats: Address resolution protocol attack and countermeasures
Free accessDOAJ | 2024|Keywords: computer network security, telecommunication security -
A coding scheme to force the eavesdropper falling in error avalanche
Free accessDOAJ | 2024|Keywords: security, telecommunication security -
Pimavanserin’s Safety Profile: Insights from a Phase 3b Clinical Trial
IOS Press | 2024|Keywords: safety -
Virtual‐physical power flow method for cyber‐physical power system contingency and vulnerability assessment
Free accessWiley | 2024|Keywords: power system cyber‐security and privacy, power system security -
A Methodology for Dynamic Security Risks Assessment in Interconnected IT Systems
Free accessDOAJ | 2024|Keywords: security risks, quantifying security implications, security control -
Reimagining the Anthropocene in the Search for Human Security: Humans as Creating Creatures
DeGruyter | 2024|Keywords: human security, menschliche Sicherheit (Human Security) -
A New Security Measure in Secret Sharing Schemes and Secure Network Coding
Free accessDOAJ | 2024|Keywords: Individual security, individual security threshold, perfect security -
SybilPSIoT: Preventing Sybil attacks in signed social internet of things based on web of trust and smart contract
Free accessWiley | 2024|Keywords: computer network security -
Security analysis and monitoring assessment of networked printers: A report
Free accessDOAJ | 2024|Keywords: computer network security, security of data -
How Can Credit Supervision Mechanism Improve Security Crowdsourcing Ecosystem Governance: An Evolutionary Game Theory Perspective
Free accessDOAJ | 2024|Keywords: Cyber security, security crowdsourcing ecosystem -
REN-A.I.: A Video Game for AI Security Education Leveraging Episodic Memory
Free accessDOAJ | 2024|Keywords: AI security, security education -
Maleficent Neural Networks, the Embedding of Malware in Neural Networks: A Survey
Free accessDOAJ | 2024|Keywords: cyber security, neural network security -
Investigation of alternative RF power limit control methods for 0.5T, 1.5T, and 3T parallel transmission cardiac imaging: A simulation study
Wiley | 2024|Keywords: RF safety, safety factor -
Security of federated learning in 6G era: A review on conceptual techniques and software platforms used for research and analysis
Elsevier | 2024|Keywords: Security -
Using chaos to encrypt images with reconstruction through deep learning model for smart healthcare
Elsevier | 2024|Keywords: Security -
Generalized antenna sequence spatial modulation (GASSM): a novel framework for enhanced PHY layer security and energy efficiency
Free accessDOAJ | 2024|Keywords: Security capacity, Physical layer security -
Cyber Malware : Offensive and Defensive Systems
Springer Verlag | 2024|Keywords: Security systems. -
Bionic Hand with Phalanx Built-In Servos
Springer Verlag | 2024|Keywords: Security Science and Technology, Systems and Data Security -
Beyond Binary Classification: A Fine-Grained Safety Dataset for Large Language Models
Free accessDOAJ | 2024|Keywords: LLM safety, automatic safety score -
An Automated Home Security System Using Secure Message Queue Telemetry Transport Protocol
Wiley | 2024|Keywords: Home security -
FGDB‐MLPP: A fine‐grained data‐sharing scheme with blockchain based on multi‐level privacy protection
Free accessWiley | 2024|Keywords: computer network security -
Secure Edge and Fog Computing Enabled AI for IoT and Smart Cities : Includes selected Papers from International Conference on Advanced Computing & Next-Generation Communication (ICACNGC 2022)
Springer Verlag | 2024|Keywords: Security systems. -
Safety and efficacy results of percutaneous renal stent implantation in patients with acute coronary syndrome with ectatic and aneurysmatic coronary arteries
Taylor & Francis Verlag | 2024|Keywords: safety -
AI and Security, From an Information Security and Risk Manager Standpoint
Free accessDOAJ | 2024|Keywords: security, AI for security -
Scrutinizing Security in Industrial Control Systems: An Architectural Vulnerabilities and Communication Network Perspective
Free accessDOAJ | 2024|Keywords: ICS security, cyber security -
PRISTINE: An Emulation Platform for PCB-Level Hardware Trojans
Free accessDOAJ | 2024|Keywords: pCB security, supply chain security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.