Year of publication
Source
Type of material
Licence
Language
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Masking Proofs are Tight and How to Exploit it in Security Evaluations
Free accessBASE | 2018|Keywords: Security level, Security evaluation -
Information Security and People: A Conundrum for Compliance
Free accessBASE | 2017|Keywords: security compliance, security management, end user security behaviour -
Cyber Security Challenges & Their Solutions in India
Free accessBASE | 2022|Keywords: security systems, cyber security, security tools -
Effect of safety climate on safety behavior in employees: The mediation of safety motivation
Free accessBASE | 2019|Keywords: safety behavior, safety climate, safety motivation -
Security Warning Life Cycle: Challenges and Panacea
Free accessBASE | 2017|Keywords: Security, Security Dialogues, Security Warning, Usable Security -
Integrated Model of Knowledge Management for Security of Information Technologies: Standards ISO/IEC 15408 and ISO/IEC 18045
Free accessBASE | 2019|Keywords: information security, IT security, security standards -
Qualitative Assessment on Effectiveness of Security Approaches towards Safeguarding NFC Devices & Services
Free accessBASE | 2018|Keywords: Mobile security, Security, Wireless security -
An Analysis of the State of Electron Security in the Wild
Free accessBASE | 2020|Keywords: it security, application security, web security -
Social identity, safety climate and self-reported accidents among construction workers
Free accessBASE | 2018|Keywords: Safety Management, Safety Culture, Safety Leadership -
Making Masking Security Proofs Concrete Or How to Evaluate the Security of any Leaking Device
Free accessBASE | 2015|Keywords: Security proofs -
Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment
Free accessBASE | 2015|Keywords: Security, Side-channel security, Computational security, Security assessment -
Eliciting and refining requirements for comprehensible security
Free accessBASE | 2016|Keywords: information security, security requirements, comprehensible security -
Very High Order Masking: Efficient Implementation and Security Evaluation
Free accessBASE | 2017|Keywords: Security evaluation -
Security in Agile Software Development: A Practitioner Survey
Free accessBASE | 2020|Keywords: security engineering, software security, security standards, security assurance -
Effect of safety climate on safety behavior in employees: The mediation of safety motivation
Free accessBASE | 2019|Keywords: safety behavior, safety climate, safety motivation -
Importance of Mobile Security
Free accessBASE | 2019|Keywords: Computer Security, Mobile security, data security -
Validation of Perception and Decision-Making Systems for Autonomous Driving via Statistical Model Checking
Free accessBASE | 2019|Keywords: security -
A Modular End-to-End Framework for Secure Firmware Updates on Embedded Systems
Free accessBASE | 2021|Keywords: Security and privacy, Security in hardware, Hardware security implementation, Hardware-based security protocols -
IoT-based Application of Information Security Triad
Free accessBASE | 2021|Keywords: Security of IoT, Information Security, Security Triad -
Improving Android app security and privacy with developers
Free accessBASE | 2020|Keywords: Android security, developer-centric security, mobile security -
A Hybrid Convolution Neural Network with Binary Particle Swarm Optimization for Intrusion Detection
Free accessBASE | 2020|Keywords: Cyber security, Information Security, Network Security -
Nighttime Vehicle Detection Methods based on Brake Light/Taillight Features: A Review
Free accessBASE | 2020|Keywords: Cyber security, Information Security, Network Security -
An architecture to manage security operations for digital service chains
Free accessBASE | 2021|Keywords: Cyber-security paradigm, Security architecture -
Security Debt: Characteristics, Product Life-Cycle Integration and Items
Free accessBASE | 2021|Keywords: security, security debt -
Discrimination between Replay Attacks and Sensor Faults for Cyber-Physical Systems via Event-Triggered Communication
Free accessBASE | 2021|Keywords: Cyber-security -
Security Ontology for Adaptive Mapping of Security Standards
Free accessBASE | 2013|Keywords: security ontology, security standards -
Automatic Detection of Security Deficiencies and Refactoring Advises for Microservices
Free accessBASE | 2023|Keywords: Security, Security Scanning Tools, Security problems, Security scanning, Security scanning tool, Security testing, Security vulnerabilities -
SECURE COMMUNICATION USING PFS IN A DISTRIBUTED ENVIRONMENT
Free accessBASE | 2018|Keywords: Security Analysis, Security requirements -
Transporto priemonių lokalaus belaidžio tinklo saugios komunikacijos metodas ; A method for secure communication of vehicular local area wireless networks
Free accessBASE | 2023|Keywords: wireless network security, vehicular network security, Bluetooth security -
Automating Security Risk and Requirements Management for Cyber-Physical Systems
Free accessBASE | 2020|Keywords: Security risk management, Machine-readable security requirements, Risk-driven security, Security engineering, Security requirements, Security risk assessment, Security risk mitigation, Security risk monitoring, Automotive security, CPS security, IIoT security, OT security -
Security Champions Without Support: Results from a Case Study with OWASP SAMM in a Large-Scale E-Commerce Enterprise
Free accessBASE | 2023|Keywords: Security, Usable Security, Security Frameworks -
An architecture to manage security operations for digital service chains
Free accessBASE | 2020|Keywords: cyber-security paradigms, security architectures -
IoT Security Configurability with Security-by-Contract
Free accessBASE | 2019|Keywords: Security-by-contract, Security -
Continuous fields: Enhanced in-vehicle anomaly detection using machine learning models
Free accessBASE | 2020|Keywords: Controller area network security, automotive security, security monitoring -
Survival of an Intrusion Tolerance Database System
Free accessBASE | 2019|Keywords: Computer Security, Security -
Promoting employee safety performance in the Chinese construction industry
Free accessBASE | 2020|Keywords: safety leadership, safety performance, safety climate -
Underwater Communication through Medium Access Control
Free accessBASE | 2021|Keywords: Network Security, Computer Security, Cyber security -
Foreword
Free accessBASE | 2021|Keywords: Embedded System Security, Security and privacy~Embedded systems security -
Digital Forensics on Solid State Drive (SSD) with TRIM Feature Enabled and Deep Freeze Configuration Using Static Forensic Methods and ACPO Framework
Free accessBASE | 2020|Keywords: Cyber security, Information Security, Network Security -
Advanced Security System using PIC through Bluetooth
Free accessBASE | 2018|Keywords: Computer Security, Security -
Adding salt to pepper a structured security assessment over a humanoid robot:A Structured Security Assessment over a Humanoid Robot
Free accessBASE | 2018|Keywords: Security assessment, Security level -
The technological challenge for current generation nuclear reactors
Free accessBASE | 2019|Keywords: Nuclear reactor safety, extended safety margins, additional safety barrier -
Enhanced secure communication schemes for machine-to-machine and vehicular ad hoc networks
Free accessBASE | 2019|Keywords: M2M Security, VANET Security, IoT Security -
ICT security in revenue administration - incidents, security incidents - detection, response, resolve
Free accessBASE | 2023|Keywords: ICT security, security incidents, ax administration Computer Security Incident Response Team -
BlackWatch:increasing attack awareness within web applications
Free accessBASE | 2019|Keywords: Software security, Web application security, Cyber security -
Usable Security. A Systematic Literature Review
Free accessBASE | 2023|Keywords: usable security, security, cyber-security -
Organisational Information Security Strategy: Review, Discussion and Future Research
Free accessBASE | 2017|Keywords: Information security strategy, security quality, Security and privacy, Formal methods and theory of security, Formal security models -
Does safety climate make sense in hospitals of a developing country?
Free accessBASE | 2021|Keywords: Patient’s safety, Safety climate, Safety culture -
Web Application Security (Dagstuhl Seminar 18321)
Free accessBASE | 2019|Keywords: Web Application Security, Browser Security, Software Security, Human Aspects in Security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.