Year of publication
Type of media
Subject
Type of material
Licence
Language
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Тoxicity of exhaust gasessolid fuel boiler KE-25-14S
Free accessDOAJ | 2020|Keywords: environmental safety of thermal power plants -
Обеспечение безопасности корпоративных сетей на основе оборудования D-Link
Free accessDOAJ | 2023|Keywords: port security, security -
КОНЦЕПЦІЯ ПІДВИЩЕННЯ БЕЗПЕКИ ВУЗЛІВ РОЗПОДІЛЬНОЇ ЕНЕРГЕТИЧНОЇ ІНФРАСТРУКТУРИ УКРАЇНИ
Free accessDOAJ | 2023Keywords: safety -
ЗАСТОСУВАННЯ МЕТОДИКИ ВИЗНАЧЕННЯ ДОПУСТИМИХ РІВНІВ НАПРУГ ДОТИКУ ТА СТРУМІВ ДЛЯ ЗАБЕЗПЕЧЕННЯ ЕЛЕКТРОБЕЗПЕКИ
Free accessDOAJ | 2013|Keywords: electric safety -
Еlectronic fire safety systems efficiency in the combustion zone of cars for underground parkings of residential buildings
Free accessDOAJ | 2020|Keywords: electronic security systems, fire safety -
ДОСЛІДЖЕННЯ ВИКОРИСТАННЯ АЛЬТЕРНАТИВНИХ ВИДІВ ПАЛИВА НА ПОЛТАВЩИНІ
Free accessDOAJ | 2023|Keywords: energy security, environmental security -
АНАЛІЗ ПОТОЧНОГО СТАНУ ЕНЕРГОСИСТЕМИ ТА СТРАТЕГІЇ РОЗВИТКУ РОЗОСЕРЕДЖЕНОЇ ГЕНЕРАЦІЇ В УКРАЇНІ
Free accessDOAJ | 2024Keywords: energy security -
АНАЛІЗ ПЕРСПЕКТИВ РОЗВИТКУ ТЕЦ УКРАЇНИ В УМОВАХ ІНТЕГРАЦІЇ В ЗАГАЛЬНОЄВРОПЕЙСЬКИЙ ПРОСТІР
Free accessDOAJ | 2023|Keywords: energy security -
ZyConChain: A Scalable Blockchain for General Applications
Free accessDOAJ | 2020|Keywords: security -
ZTSFC: A Service Function Chaining-Enabled Zero Trust Architecture
Free accessDOAJ | 2023|Keywords: network security -
ZSM-Based E2E Security Slice Management for DDoS Attack Protection in MEC-Enabled V2X Environments
Free accessDOAJ | 2024|Keywords: security -
ZMAD: Lightweight Model-Based Anomaly Detection for the Structured Z-Wave Protocol
Free accessDOAJ | 2023|Keywords: smart home security -
Zero Assignment via Generalized Sampler: A Countermeasure Against Zero-Dynamics Attack
Free accessDOAJ | 2021|Keywords: System security -
ZDDR: A Zero-Shot Defender for Adversarial Samples Detection and Restoration
Free accessDOAJ | 2024|Keywords: model security -
You Are Probably Not the Weakest Link: Towards Practical Prediction of Susceptibility to Semantic Social Engineering Attacks
Free accessDOAJ | 2016|Keywords: Security -
YOLOv7-WFD: A Novel Convolutional Neural Network Model for Helmet Detection in High-Risk Workplaces
Free accessDOAJ | 2023|Keywords: Safety helmet detection -
YOLO-ESCA: A High-Performance Safety Helmet Standard Wearing Behavior Detection Model Based on Improved YOLOv5
Free accessDOAJ | 2024|Keywords: safety management -
xVDB: A High-Coverage Approach for Constructing a Vulnerability Database
Free accessDOAJ | 2022|Keywords: software security -
XGB-RF: A Hybrid Machine Learning Approach for IoT Intrusion Detection
Free accessDOAJ | 2022|Keywords: IoT security -
X-Attack 2.0: The Risk of Power Wasters and Satisfiability Don’t-Care Hardware Trojans to Shared Cloud FPGAs
Free accessDOAJ | 2024|Keywords: FPGA security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.