Year of publication
Type of media
Source
Subject
Type of material
Licence
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
A collaborative policy-based security scheme to enforce resource access controlling mechanism
Online Contents | 2019|Keywords: Security policy, Android system security, Security profile -
Physical layer security schemes for MIMO systems: an overview
Online Contents | 2019|Keywords: Security services, Security -
Setting exposure guidelines and product safety standards for radio-frequency exposure at frequencies above 6 GHz: brief review
Online Contents | 2019|Keywords: Human safety -
A trust computed framework for IoT devices and fog computing environment
Online Contents | 2019|Keywords: Handoff IoT devices security, IoT security -
Sicherheit vernetzter, hochautomatisierter Roboter
Online Contents | 2019|Keywords: cyber security, Safety & Security -
Optimal secret sharing for wireless information security in the era of Internet of Things
Online Contents | 2019|Keywords: Network security -
NERA: A new and efficient RSU based authentication scheme for VANETs
Online Contents | 2019|Keywords: Network security -
Semantic enrichment of spatio-temporal trajectories for worker safety on construction sites
Online Contents | 2019|Keywords: Safety -
Logic Locking: A Survey of Proposed Methods and Evaluation Metrics
Online Contents | 2019|Keywords: Design-for-security, Security -
Certificateless searchable public key authenticated encryption with designated tester for cloud-assisted medical Internet of Things
Online Contents | 2019|Keywords: Security -
Preparation of Monodisperse Silica Nanoparticles via Controlling the Interphase of Two-Phase Synthesis for Optical Anticounterfeiting Materials
Online Contents | 2019|Keywords: Security features -
Physische Sicherheit in der Mensch-Roboter Kollaboration
Online Contents | 2019|Keywords: robot safety -
BlackEye: automatic IP blacklisting using machine learning from security logs
Online Contents | 2019|Keywords: Security logs -
Statistical network protocol identification with unknown pattern extraction
Online Contents | 2019|Keywords: Network security -
Cache nFace: a simple countermeasure for the producer-consumer collusion attack in Named Data Networking
Online Contents | 2019|Keywords: Network security -
Access control in the Internet of Things: a survey of existing approaches and open research questions
Online Contents | 2019|Keywords: Security -
A Framework to Create a Virtual Cyber Battlefield for Cyber Maneuvers and Impact Assessment
Online Contents | 2019|Keywords: Computer security -
The Communication Complexity of Private Simultaneous Messages, Revisited
Online Contents | 2019|Keywords: Information theoretic security -
$$E^{2} SR^{2}$$: An acknowledgement-based mobile sink routing protocol with rechargeable sensors for wireless sensor networks
Online Contents | 2019|Keywords: Security -
DSKMS: a dynamic smart key management system based on fuzzy logic in wireless sensor networks
Online Contents | 2019|Keywords: Security -
A Bayesian game model and network availability model for small cells under denial of service (DoS) attack in 5G wireless communication network
Online Contents | 2019|Keywords: Security -
Multi-cloud cooperative intrusion detection system: trust and fairness assurance
Online Contents | 2019|Keywords: Security -
Towards a capability maturity model for digital forensic readiness
Online Contents | 2019|Keywords: IT-Security management -
PbS Quantum Dots Based on Physically Unclonable Function for Ultra High-Density Key Generation
Online Contents | 2019|Keywords: information security -
Isolation in cloud computing infrastructures: new security challenges
Online Contents | 2019|Keywords: Cloud security -
Lightweight solutions to counter DDoS attacks in software defined networking
Online Contents | 2019|Keywords: Security -
Improvement of ID-based proxy re-signature scheme with pairing-free
Online Contents | 2019|Keywords: Security attack -
Some complexity results for stateful network verification
Online Contents | 2019|Keywords: Safety verification -
Secrecy performance analysis of CIOD–OFDM systems over wireless fading channels
Online Contents | 2019|Keywords: Physical layer security -
Transformation-based processing of typed resources for multimedia sources in the IoT environment
Online Contents | 2019|Keywords: Resource security protection -
A new three-factor authentication and key agreement protocol for multi-server environment
Online Contents | 2019|Keywords: Three-factor security -
An OpenStack based cloud testbed framework for evaluating HTTP flooding attacks
Online Contents | 2019|Keywords: Cloud computing security -
Dispersed beamforming approach for secure communication in UDN
Online Contents | 2019|Keywords: Security -
Characterization of untrusted relaying networks in the presence of an adversary jammer
Online Contents | 2019|Keywords: Physical layer security -
Measurement and security trust in WSNs: a proximity deviation based approach
Online Contents | 2019|Keywords: Sensor security -
Estimating ambient visibility in the presence of fog: a deep convolutional neural network approach
Online Contents | 2019|Keywords: Road safety -
A situation-driven framework for dynamic security management
Online Contents | 2019|Keywords: Dynamic security management -
Methodik zur Entwicklung sicherer kollaborativer Produktionssysteme im Rahmen von Industrie 4.0
Online Contents | 2019|Keywords: safety-compliant development process, IT security risks and measures -
Secure communication via an untrusted relay with unreliable backhaul connections
Online Contents | 2019|Keywords: Physical layer security -
Research on reliability of Internet of Things RFID based on improved random hash protocol and cooperative game in low-carbon supply chain environment
Online Contents | 2019|Keywords: Random oracle model security theory -
Novel Randomized Placement for FPGA Based Robust ROPUF with Improved Uniqueness
Online Contents | 2019|Keywords: Hardware security -
A Distributed Error and Anomaly Communication Architecture for Analog and Mixed-Signal Systems
Online Contents | 2019|Keywords: Functional safety -
Enhanced Authentication Using Hybrid PUF with FSM for Protecting IPs of SoC FPGAs
Online Contents | 2019Keywords: Hardware security and IP protection -
Globale Erdungssysteme: Bestimmung der Erdungsspannung (EPR) in Mittelspannungs-Kabelnetzen im einpoligen Fehlerfall
Online Contents | 2019|Keywords: safety of people -
A framework for enhancing mobile workflow execution through injection of flexible security controls
Online Contents | 2018|Keywords: Security injection, Security controls, Security modeling -
Countering targeted cyber-physical attacks using anomaly detection in self-adaptive Industry 4.0 Systems
Online Contents | 2018|Keywords: security monitoring, security metrics
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.