Year of publication
Type of media
Source
Subject
Type of material
Licence
Language
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Security of Satellite-Terrestrial Communications: Challenges and Potential Solutions
Free accessDOAJ | 2022|Keywords: Security, network security, satellite security, communications security, NTN security -
When Agile Security Meets 5G
Free accessDOAJ | 2020|Keywords: 5G security, agile security, cloud security, security risk management -
A Survey on the Cyber Security of Small-to-Medium Businesses: Challenges, Research Focus and Recommendations
Free accessDOAJ | 2022|Keywords: Cyber security, security posture, cyber security threats, cyber security frameworks, security and privacy -
WLAN Security: Threats And Countermeasures
Free accessDOAJ | 2018|Keywords: wifi security, wlan security, wireless security -
The Roadmap to 6G Security and Privacy
Free accessDOAJ | 2021|Keywords: security, security threats, AI/ML security, physical layer security -
An Integrated Knowledge Graph to Automate Cloud Data Compliance
Free accessDOAJ | 2020|Keywords: cloud security, security domains, security compliance models, cloud security models -
Hybrid Cipher for Secure Multimedia by using AES and RC4 Chain
Free accessDOAJ | 2017|Keywords: multimedia security; security; aes; rc4 -
Hybrid Cipher for Secure Multimedia by using AES and RC4 Chain
Free accessDOAJ | 2017|Keywords: Multimedia Security; Security; AES; RC4 -
Data-Driven Security for Smart City Systems: Carving a Trail
Free accessDOAJ | 2020|Keywords: data-driven security, security protection techniques, security policies, security management -
Denial of service attack detection through machine learning for the IoT
Free accessDOAJ | 2020|Keywords: security, network security -
Security Operations Center: A Systematic Study and Open Challenges
Free accessDOAJ | 2020|Keywords: Security management, security operations center, security operations -
Factors Related to Cyber Security Behavior
Free accessDOAJ | 2020|Keywords: Cyber security, cyber security behaviours, cyber security breaches, cyber security perception -
Toward Automated Security Analysis and Enforcement for Cloud Computing Using Graphical Models for Security
Free accessDOAJ | 2022|Keywords: cloud security, graphical security models, security assessment -
A Comparative Analysis of Industrial Cybersecurity Standards
Free accessDOAJ | 2023|Keywords: security controls, security standards, security requirements -
Analysis of short blocklength codes for secrecy
Free accessDOAJ | 2018|Keywords: Physical-layer security, Security measures -
„Mimowolny stabilizator”. Kościół rzymskokatolicki jako gwarant bezpieczeństwa wewnętrznego PRL
Free accessDOAJ | 2021|Keywords: interial security, community security, social security, cultural security -
Assessment of the Impact of Information Security Awareness Training Methods on Knowledge, Attitude, and Behavior
Free accessDOAJ | 2022|Keywords: Information security awareness, security training, security management -
DomainPrio: Prioritizing Domain Name Investigations to Improve SOC Efficiency
Free accessDOAJ | 2022|Keywords: Network security, security operations, security operations centers -
Survey of smart contract security
Free accessDOAJ | 2020|Keywords: on-chain security, off-chain security, security analysis -
CloudStrike: Chaos Engineering for Security and Resiliency in Cloud Infrastructure
Free accessDOAJ | 2020|Keywords: Cloud security, security chaos engineering, security risk assessment -
A Lightweight PUF-Based Authentication Protocol Using Secret Pattern Recognition for Constrained IoT Devices
Free accessDOAJ | 2021|Keywords: hardware security, IoT security, lightweight security -
Cyber Security Maturity Assessment Framework for Technology Startups: A Systematic Literature Review
Free accessDOAJ | 2023|Keywords: Cyber security risk, cyber security maturity, cyber security framework, return of security investment -
Security and Privacy Analysis of Mobile Health Applications: The Alarming State of Practice
Free accessDOAJ | 2018|Keywords: Communication system security, mobile security, application security -
Oracle Indistinguishability and Its Applications
Free accessDOAJ | 2023|Keywords: quantum security, classical security, oracle security -
Physical Layer Security for Beyond 5G: Ultra Secure Low Latency Communications
Free accessDOAJ | 2021|Keywords: Physical layer security, 6G security, beyond 5G security, security at layer-1 -
System-Agnostic Security Domains for Understanding and Prioritizing Systems Security Engineering Efforts
Free accessDOAJ | 2017|Keywords: Security domains, systems security engineering, security engineering -
A Customizable Framework for Prioritizing Systems Security Engineering Processes, Activities, and Tasks
Free accessDOAJ | 2017|Keywords: Systems security engineering, security engineering, security framework -
Securing the Intermediate Data of Scientific Workflows in Clouds With ACISO
Free accessDOAJ | 2019|Keywords: Cloud security, intermediate data security, security strategy allocation -
Privacy‐preserving data integration scheme in industrial robot system based on fog computing and edge computing
Free accessDOAJ | 2024|Keywords: computer network security, security of data -
Detection of Denial-of-Service Attack in Wireless Sensor Networks: A Lightweight Machine Learning Approach
Free accessDOAJ | 2023|Keywords: cyber security, IoT security, network security -
A Review of Game Theory Application Research in Safety Management
Free accessDOAJ | 2020|Keywords: safety field, safety issues, safety management -
An Empirical Analysis of Incorrect Account Remediation in the Case of Broken Authentication
Free accessDOAJ | 2023|Keywords: Cyber security, internet security, security measurement -
An Overview of the Security Landscape of Virtual Mobile Networks
Free accessDOAJ | 2021|Keywords: Security, virtual mobile networks (VMNs) security, NFV security -
Conceptual Systems Security Requirements Analysis: Aerial Refueling Case Study
Free accessDOAJ | 2018|Keywords: security, security engineering, systems security engineering -
Evaluating Performance of Web Application Security Through a Fuzzy Based Hybrid Multi-Criteria Decision-Making Approach: Design Tactics Perspective
Free accessDOAJ | 2020|Keywords: security assessment, security design, security tactics -
Small Modular Reactors and Advanced Reactor Security: Regulatory Perspectives on Integrating Physical and Cyber Security by Design to Protect Against Malicious Acts and Evolving Threats
Free accessDOAJ | 2020|Keywords: security by design, nuclear security, nuclear security regulations -
Survey of research on confidential computing
Free accessDOAJ | 2024|Keywords: computer network security, security of data -
Circuit: A JavaScript Memory Heap-Based Approach for Precisely Detecting Cryptojacking Websites
Free accessDOAJ | 2022|Keywords: Browser security, web security -
Intelligent Video Data Security: A Survey and Open Challenges
Free accessDOAJ | 2021|Keywords: Video data security, intelligent security, visual security -
Research on security scenarios and security models for 6G networking
Free accessDOAJ | 2021|Keywords: network security, wireless communication security -
Secure Development of Big Data Ecosystems
Free accessDOAJ | 2019|Keywords: security by design, security patterns, security reference -
Distribution Network Security Situation Awareness Method Based on Security Distance
Free accessDOAJ | 2019|Keywords: Distribution system security region (DSSR), security assessment, security distance -
Operator's Influence on the Safety of the Controlled Process
Free accessDOAJ | 2015|Keywords: safety, safety assessment, safety function, safety related control system -
5G wireless P2MP backhaul security protocol: an adaptive approach
Free accessDOAJ | 2019|Keywords: Security protocol, Formal security analysis -
A PVT Tolerant True Random Number Generator Based on Oscillator Phase Under Sub-Harmonic Injection Locking
Free accessDOAJ | 2021|Keywords: Hardware security, security, security primitive -
Paths for Improving Public Service Capability Regarding Industrial Internet Security
Free accessDOAJ | 2021|Keywords: industrial Internet security, security-related public service, cybersecurity, industrial information security, innovative development -
Towards a Virtual Domain Based Authentication on MapReduce
Free accessDOAJ | 2016|Keywords: Cloud Computing Security, Security Requirements, Security Threats -
Towards Quantified Data Analysis of Information Flow Tracking for Secure System Design
Free accessDOAJ | 2018|Keywords: Hardware security, information flow security, security verification -
New Approaches to the Analysis of the Security Environment and their Importance for Security Management
Free accessDOAJ | 2015|Keywords: security environment, security situation, security management -
Multimodal layer surveillance map based on anomaly detection using multiagents for smart city security
Free accessDOAJ | 2022|Keywords: security robot, smart-city security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.