Year of publication
Type of media
Source
Subject
Type of material
Licence
Language
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Real-Time Monitoring and Management of Hardware and Software Resources in Heterogeneous Computer Networks through an Integrated System Architecture
Free accessDOAJ | 2023|Keywords: network security, security monitoring, information security, computer security, data security -
Design of a Symmetry Protocol for the Efficient Operation of IP Cameras in the IoT Environment
Free accessDOAJ | 2019|Keywords: IP camera security, NVR security, video security -
Dimensions of Health Security—A Conceptual Analysis
Free accessDOAJ | 2020|Keywords: cooperative security, health security, security for individuals -
A Survey of Public Key Infrastructure-Based Security for Mobile Communication Systems
Free accessDOAJ | 2016|Keywords: PKI security, mobile communication security, GSM-authentication and key agreement (AKA) security, CDMA-AKA security, long term evolution-authentication and key agreement (LTE-AKA) security -
An Intelligent Improvement of Internet-Wide Scan Engine for Fast Discovery of Vulnerable IoT Devices
Free accessDOAJ | 2018|Keywords: security, intelligent security -
Developing Secure IoT Services: A Security-Oriented Review of IoT Platforms
Free accessDOAJ | 2018|Keywords: information security, IoT security -
Cyberattacks and Security of Cloud Computing: A Complete Guideline
Free accessDOAJ | 2023|Keywords: security threats, security attacks -
Fuzzy-Based Symmetrical Multi-Criteria Decision-Making Procedure for Evaluating the Impact of Harmful Factors of Healthcare Information Security
Free accessDOAJ | 2020|Keywords: healthcare security, information security -
Future Technology: Software-Defined Network (SDN) Forensic
Free accessDOAJ | 2021|Keywords: network security, cloud security -
A Pairing-Free Identity-Based Identification Scheme with Tight Security Using Modified-Schnorr Signatures
Free accessDOAJ | 2021|Keywords: tight security, provable security -
Theory-Based Model and Prediction Analysis of Information Security Compliance Behavior in the Saudi Healthcare Sector
Free accessDOAJ | 2020|Keywords: information security, information security compliance behavior -
Software Security Estimation Using the Hybrid Fuzzy ANP-TOPSIS Approach: Design Tactics Perspective
Free accessDOAJ | 2020|Keywords: software security, security tactics -
Temperature elevation in the human brain and skin with thermoregulation during exposure to RF energy
Free accessDOAJ | 2018|Keywords: Human safety, Safety guidelines -
Smart occupational health and safety for a digital era and its place in smart and sustainable cities
Free accessDOAJ | 2021|Keywords: safety at work in smart cities, organizational safety management, safety governance, occupational health and safety -
Symmetry-Adapted Machine Learning for Information Security
Free accessDOAJ | 2020|Keywords: information security, IoT security -
Security Enhanced Symmetric Key Encryption Employing an Integer Code for the Erasure Channel
Free accessDOAJ | 2022|Keywords: security enhancement, security evaluation -
Analysis of Information Security Management Systems at 5 Domestic Hospitals with More than 500 Beds
Free accessDOAJ | 2010|Keywords: information security management system, information security, security requirements -
The Psychometrics of Questionnaires Designed for the E Levels and Safety Culture Case Study: Power Plant Generator Manufacturing Company
Free accessDOAJ | 2021|Keywords: Safety level, Safety climate, Safety performance -
A Study on Security and Privacy Guidelines, Countermeasures, Threats: IoT Data at Rest Perspective
Free accessDOAJ | 2019|Keywords: security guidelines, security goals -
Patient safety culture in teaching hospitals in Iran: assessment by the hospital survey on patient safety culture (HSOPSC)
Free accessDOAJ | 2016|Keywords: Patient safety, Patient safety culture -
ONS resolution prediction based on Rasch model
Free accessDOAJ | 2019|Keywords: security, iot security -
Enhancing Cyber Security Governance and Policy for SMEs in Industry 5.0: A Comparative Study between Saudi Arabia and the United Kingdom
Free accessDOAJ | 2023|Keywords: cyber security, security mindset -
Overview of Skin Whitening Agents: Drugs and Cosmetic Products
Free accessDOAJ | 2016|Keywords: safety -
Blockchain Security in Cloud Computing: Use Cases, Challenges, and Solutions
Free accessDOAJ | 2017|Keywords: computer security -
Students' Perceptions about School Safety in Doroodzan Middle School, Marvdasht City, Fars Province, Iran
Free accessDOAJ | 2015|Keywords: physical safety, social safety, cultural safety -
A reflection on the CFS (Committee on World Food Security) Voluntary Guidelines on Food Systems and Nutrition in advance of the United Nations Food Security Summit
Free accessDOAJ | 2021|Keywords: Food Security, Food Security Summit, Committee on Food Security -
Food suppliers' perceptions and practical implementation of food safety regulations in Taiwan
Free accessDOAJ | 2015|Keywords: food safety perception, food safety practice, food safety regulation -
Cultural and Social Enigmas: Missing Pieces of Food Security
Free accessDOAJ | 2020|Keywords: food security, nutritional security -
BGPcoin: Blockchain-Based Internet Number Resource Authority and BGP Security Solution
Free accessDOAJ | 2018|Keywords: BGP security -
Machine Learning-Based Botnet Detection in Software-Defined Network: A Systematic Review
Free accessDOAJ | 2021|Keywords: network security -
The relationship between safety management and patient safety culture in Cancer Treatment Centers
Free accessDOAJ | 2019|Keywords: safety management; patient safety culture; accreditation; patient safety friendly hospitals standards; cancer treatment centers. -
Assessment of safety management in different wards of AL Zahra hospital in Isfahan city in 2013
Free accessDOAJ | 2014|Keywords: Safety management, Accidents and safety committee -
Security and Accuracy of Fingerprint-Based Biometrics: A Review
Free accessDOAJ | 2019|Keywords: security -
A Review of Studies in the Field of Evaluation of Industrial Safety Culture & Safety Climate in Iran
Free accessDOAJ | 2020|Keywords: Review studies, Safety Culture, Safety Climate, Industry Workers, Iran -
Design of a Secure System Considering Quality of Service
Free accessDOAJ | 2014|Keywords: security, quality of security service -
An Innovative Design of Substitution-Boxes Using Cubic Polynomial Mapping
Free accessDOAJ | 2019|Keywords: security -
Secure multi-path routing for Internet of Things based on trust evaluation
Free accessDOAJ | 2024|Keywords: iot security, packet security verification -
RFID Medication Management System in Hospitals
Free accessDOAJ | 2020|Keywords: safety, patient safety -
Effects and Satisfaction of Medical Device Safety Information Reporting System Using Electronic Medical Record
Free accessDOAJ | 2017|Keywords: patient safety, safety management -
Sustainable Utilization of Indigenous Goats in Southern Africa
Free accessDOAJ | 2020|Keywords: food security -
Almost-Minimal-Round BBB-Secure Tweakable Key-Alternating Feistel Block Cipher
Free accessDOAJ | 2021|Keywords: beyond-birthday-bound security, provable security -
Job Stress and Safety Climate in Cancer Treatment Centers: Upgraded Model for Dimensions
Free accessDOAJ | 2018|Keywords: job stress, safety climate, patient safety, medicine personnel, modeling. -
Evaluation of Safety Culture and Work-Related Accidents in Oil Depots of Tehran
Free accessDOAJ | 2017|Keywords: safety culture, safety -
Security and Privacy in IoT-Cloud-Based e-Health Systems—A Comprehensive Review
Free accessDOAJ | 2020|Keywords: security -
A Novel Methodology for Providing Security in Electronic Health Record Using Fuzzy Based Multi Agent System
Free accessDOAJ | 2021|Keywords: information security, security model -
Comprehensive Survey of Multimedia Steganalysis: Techniques, Evaluations, and Trends in Future Research
Free accessDOAJ | 2022|Keywords: information security -
Systematic Review on Identification and Prediction of Deep Learning-Based Cyber Security Technology and Convergence Fields
Free accessDOAJ | 2022|Keywords: cyber security, security convergence -
Integrating a High-Reliability Multicriteria Trust Evaluation Model with Task Role-Based Access Control for Cloud Services
Free accessDOAJ | 2021|Keywords: information security -
Construction of S-Box Based on Chaotic Map and Algebraic Structures
Free accessDOAJ | 2019|Keywords: security analysis
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.