Year of publication
Type of media
Subject
Type of material
Licence
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Bounded-Deducibility Security (Invited Paper)
Free accessDataCite | 2021|Keywords: Security and privacy → Security requirements, Information-flow security, Security and privacy → Formal security models, Security and privacy → Logic and verification -
Cyberspace and Innocent Passage: Regulations for the Security of the Coastal State
TIBKAT | 2020|Keywords: National security, Computer security -
Data Mining and Association Rules to Determine Twitter Trends
TIBKAT | 2020|Keywords: National security, Computer security -
Gravity Compensation Using Low-Cost Automation for Robot Control
TIBKAT | 2020|Keywords: National security, Computer security -
3D computational ghost imaging (Invited Paper) [8899-1]
British Library Conference Proceedings | 2013|Keywords: Quantum security, Security, Information security -
Innovating Global Nuclear Security Governance ; From Seoul Nuclear Security Symposium
British Library Conference Proceedings | 2012|Keywords: Nuclear security, Security -
The International Framework on Civil Liability for Nuclear Damage ; Needs and Characteristics of the Three Conventions
British Library Conference Proceedings | 2012|Keywords: Nuclear security, Security -
Vibration Effects of the Fixed-Wing Aircraft of the Army Aviation from Ecuador on the Human Body
TIBKAT | 2020|Keywords: National security, Computer security -
Lessons Learned from Fukushima NPP Accident: Nuclear Security Perspectives
British Library Conference Proceedings | 2012|Keywords: Nuclear security, Security -
The Effect of Low Dose Radiation on Humans: Unknown Unknowns
British Library Conference Proceedings | 2012|Keywords: Nuclear security, Security -
Determination of Optimal Procedures for Maintenance and Repair Operations of the GDU-620 Garmin Applied to the DA20C-1 Aircraft
TIBKAT | 2020|Keywords: National security, Computer security -
Manufacturing Cost Prediction Through Data Mining
TIBKAT | 2020|Keywords: National security, Computer security -
Monte Carlo-Based Localization for Kidnapped Robot Problem
TIBKAT | 2020|Keywords: National security, Computer security -
Ackermann UGV with 2D Mapping for Unknown Environments
TIBKAT | 2020|Keywords: National security, Computer security -
Autonomous Navigation Based on Proportional Controller with GPS Setpoint for UAV in External Environments
TIBKAT | 2020|Keywords: National security, Computer security -
Kinect and Manipulator-Based Sample Collection System for Military Robot
TIBKAT | 2020|Keywords: National security, Computer security -
Expert Nutritional System for Military Athletes Based on Fuzzy Logic and Inferential Statistics
TIBKAT | 2020|Keywords: National security, Computer security -
Towards a high-speed quantum random number generator [8899-29]
British Library Conference Proceedings | 2013|Keywords: Quantum security, Security, Information security -
Truly random number generation: an example [8899-30]
British Library Conference Proceedings | 2013|Keywords: Quantum security, Security, Information security -
Introduction of Useful Bibliographies and Resources related to the Fukushima Daiichi Nuclear Power Station Accident through the JAEA Library
British Library Conference Proceedings | 2012|Keywords: Nuclear security, Security -
Essential elements lacking in security proofs for quantum key distribution (Invited Paper) [8899-21]
British Library Conference Proceedings | 2013|Keywords: Quantum security, Security, Information security -
Prevent Recurrence of Nuclear Disaster(2) ; Reconstruction of Safety Logic Diagram of Nuclear System
British Library Conference Proceedings | 2012|Keywords: Nuclear security, Security -
My Achievement and Future on my Hometown Minamisoma City Affected Fukushima NPP Accident to Cooperate with the Local Core for Reconstruction and Decrease Dose Rate in the Rice Fields
British Library Conference Proceedings | 2012|Keywords: Nuclear security, Security -
The Tsunami Probabilistic Risk Assessment of Nuclear Power Plants(1) ; Outline of Tsunami PRA and Plant Systems Analysis
British Library Conference Proceedings | 2012|Keywords: Nuclear security, Security -
Risk-Communication Practice with the Public after the Fukushima Power Plant Accident ; The Support and Consultation for the proper recognition about radiation and health
British Library Conference Proceedings | 2012|Keywords: Nuclear security, Security -
Managing security work in scrum: Tensions and challenges
Free accessFraunhofer Publica | 2017|Keywords: security work, software security, security requirements -
Designing for Advanced Aerial Mobility: Human-Autonomy Teaming and In-Time System-Wide Safety Assurance
NTRS|Keywords: safety management system, productive safety, in-time safety management, Air Transportation And Safety, safety assurance -
Resilience Engineering's Potential for Advanced Air Mobility (AAM)
NTRS | 2021|Keywords: Safety-II, Air Transportation And Safety, Aviation Safety -
Water security in the Canadian Prairies: science and management challenges
British Library Conference Proceedings | 2013|Keywords: Water security, Security -
A cost-effectiveness analysis of water security and water quality: impacts of climate and land-use change on the River Thames system
British Library Conference Proceedings | 2013|Keywords: Water security, Security -
A review of the literature on patient participation in transitions of the elderly
British Library Conference Proceedings | 2015|Keywords: Patient safety, Healthcare safety -
Standardisation and its discontents
British Library Conference Proceedings | 2015|Keywords: Patient safety, Healthcare safety -
The politics of African energy development: Ethiopia's hydro-agricultural state-building strategy and clashing paradigms of water security
British Library Conference Proceedings | 2013|Keywords: Water security, Security -
The role of technology in achieving water security
British Library Conference Proceedings | 2013|Keywords: Water security, Security -
The governance dimensions of water security: a review
British Library Conference Proceedings | 2013|Keywords: Water security, Security -
Water security, global change and land-atmosphere feedbacks
British Library Conference Proceedings | 2013|Keywords: Water security, Security -
Extreme rainfall, vulnerability and risk: a continental-scale assessment for South America
British Library Conference Proceedings | 2013|Keywords: Water security, Security -
Is water security necessary? An empirical analysis of the effects of climate hazards on national-level economic growth
British Library Conference Proceedings | 2013|Keywords: Water security, Security -
Managing hydroclimatic risks in federal rivers: a diagnostic assessment
British Library Conference Proceedings | 2013|Keywords: Water security, Security -
Risk-based principles for defining and managing water security
British Library Conference Proceedings | 2013|Keywords: Water security, Security -
Risks and responses to universal drinking water security
British Library Conference Proceedings | 2013|Keywords: Water security, Security -
Growing water scarcity in agriculture: future challenge to global water security
British Library Conference Proceedings | 2013|Keywords: Water security, Security -
Domestic water and sanitation as water security: monitoring, concepts and strategy
British Library Conference Proceedings | 2013|Keywords: Water security, Security -
Catalysing sustainable water security: role of science, innovation and partnerships
British Library Conference Proceedings | 2013|Keywords: Water security, Security -
Water security in one blue planet: twenty-first century policy challenges for science
British Library Conference Proceedings | 2013|Keywords: Water security, Security -
Square Span Programs with Applications to Succinct NIZK Arguments
British Library Conference Proceedings | 2014|Keywords: Computer security, Information security -
Meet-in-the-Middle Attacks on Generic Feistel Constructions
British Library Conference Proceedings | 2014|Keywords: Computer security, Information security -
Multi-user Collisions: Applications to Discrete Logarithm, Even-Mansour and PRINCE
British Library Conference Proceedings | 2014|Keywords: Computer security, Information security -
A Simplified Representation of AES
British Library Conference Proceedings | 2014|Keywords: Computer security, Information security -
Beyond 2^c^/^2 Security in Sponge-Based Authenticated Encryption Modes
British Library Conference Proceedings | 2014|Keywords: Computer security, Information security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.