Year of publication
Type of media
Subject
Type of material
Licence
Language
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Denial of service attack detection through machine learning for the IoT
Free accessTaylor & Francis Verlag | 2020|Keywords: security, network security -
Security of Satellite-Terrestrial Communications: Challenges and Potential Solutions
Free accessDOAJ | 2022|Keywords: Security, network security, satellite security, communications security, NTN security -
When Agile Security Meets 5G
Free accessDOAJ | 2020|Keywords: 5G security, agile security, cloud security, security risk management -
Secured Model for Internet of Things (IoT) to Monitor Smart Field Data with Integrated Real-Time Cloud Using Lightweight Cryptography
Taylor & Francis Verlag | 2023|Keywords: IoT security, Security analysis -
A Survey on the Cyber Security of Small-to-Medium Businesses: Challenges, Research Focus and Recommendations
Free accessDOAJ | 2022|Keywords: Cyber security, security posture, cyber security threats, cyber security frameworks, security and privacy -
Lightweight Cryptographic Techniques and Cybersecurity Approaches
Free accessTIBKAT | 2022|Keywords: Network security -
Lightweight Cryptographic Techniques and Cybersecurity Approaches
Free accessGWLB - Gottfried Wilhelm Leibniz Bibliothek | 2022|Keywords: Network security -
Cryptography : Recent Advances and Future Developments
Free accessGWLB - Gottfried Wilhelm Leibniz Bibliothek | 2021|Keywords: Network security -
Cryptography : Recent Advances and Future Developments
Free accessTIBKAT | 2021|Keywords: Network security -
WLAN Security: Threats And Countermeasures
Free accessDOAJ | 2018|Keywords: wifi security, wlan security, wireless security -
The Roadmap to 6G Security and Privacy
Free accessDOAJ | 2021|Keywords: security, security threats, AI/ML security, physical layer security -
A Fast Image Encryption Algorithm Based on Convolution Operation
Taylor & Francis Verlag | 2019|Keywords: Information security, Security analysis -
An Integrated Knowledge Graph to Automate Cloud Data Compliance
Free accessDOAJ | 2020|Keywords: cloud security, security domains, security compliance models, cloud security models -
Hybrid Cipher for Secure Multimedia by using AES and RC4 Chain
Free accessDOAJ | 2017|Keywords: multimedia security; security; aes; rc4 -
Hybrid Cipher for Secure Multimedia by using AES and RC4 Chain
Free accessDOAJ | 2017|Keywords: Multimedia Security; Security; AES; RC4 -
Data-Driven Security for Smart City Systems: Carving a Trail
Free accessDOAJ | 2020|Keywords: data-driven security, security protection techniques, security policies, security management -
Denial of service attack detection through machine learning for the IoT
Free accessDOAJ | 2020|Keywords: security, network security -
Factors Related to Cyber Security Behavior
Free accessDOAJ | 2020|Keywords: Cyber security, cyber security behaviours, cyber security breaches, cyber security perception -
Security Operations Center: A Systematic Study and Open Challenges
Free accessDOAJ | 2020|Keywords: Security management, security operations center, security operations -
Toward Automated Security Analysis and Enforcement for Cloud Computing Using Graphical Models for Security
Free accessDOAJ | 2022|Keywords: cloud security, graphical security models, security assessment -
Digital tools for prevention through design application: A systematic review
IOS Press | 2023|Keywords: Design for safety, safety engineering, construction safety -
Analysis of short blocklength codes for secrecy
Free accessDOAJ | 2018|Keywords: Physical-layer security, Security measures -
Swimming pool safety detection device based on computer vision
SPIE | 2022|Keywords: security incidents, security detection -
A Comparative Analysis of Industrial Cybersecurity Standards
Free accessDOAJ | 2023|Keywords: security controls, security standards, security requirements -
Assessment of the Impact of Information Security Awareness Training Methods on Knowledge, Attitude, and Behavior
Free accessDOAJ | 2022|Keywords: Information security awareness, security training, security management -
DomainPrio: Prioritizing Domain Name Investigations to Improve SOC Efficiency
Free accessDOAJ | 2022|Keywords: Network security, security operations, security operations centers -
CloudStrike: Chaos Engineering for Security and Resiliency in Cloud Infrastructure
Free accessDOAJ | 2020|Keywords: Cloud security, security chaos engineering, security risk assessment -
A Lightweight PUF-Based Authentication Protocol Using Secret Pattern Recognition for Constrained IoT Devices
Free accessDOAJ | 2021|Keywords: hardware security, IoT security, lightweight security -
Security and Privacy Analysis of Mobile Health Applications: The Alarming State of Practice
Free accessDOAJ | 2018|Keywords: Communication system security, mobile security, application security -
Cyber Security Maturity Assessment Framework for Technology Startups: A Systematic Literature Review
Free accessDOAJ | 2023|Keywords: Cyber security risk, cyber security maturity, cyber security framework, return of security investment -
Survey of smart contract security
Free accessDOAJ | 2020|Keywords: on-chain security, off-chain security, security analysis -
Efficiency Analysis of Cryptographic Algorithms for Image Data Security in Cloud Environment
Taylor & Francis Verlag | 2023|Keywords: Cloud security, Security algorithms analysis -
Oracle Indistinguishability and Its Applications
Free accessDOAJ | 2023|Keywords: quantum security, classical security, oracle security -
Physical Layer Security for Beyond 5G: Ultra Secure Low Latency Communications
Free accessDOAJ | 2021|Keywords: Physical layer security, 6G security, beyond 5G security, security at layer-1 -
System-Agnostic Security Domains for Understanding and Prioritizing Systems Security Engineering Efforts
Free accessDOAJ | 2017|Keywords: Security domains, systems security engineering, security engineering -
A Customizable Framework for Prioritizing Systems Security Engineering Processes, Activities, and Tasks
Free accessDOAJ | 2017|Keywords: Systems security engineering, security engineering, security framework -
Privacy‐preserving data integration scheme in industrial robot system based on fog computing and edge computing
Free accessDOAJ | 2024|Keywords: computer network security, security of data -
Securing the Intermediate Data of Scientific Workflows in Clouds With ACISO
Free accessDOAJ | 2019|Keywords: Cloud security, intermediate data security, security strategy allocation -
Detection of Denial-of-Service Attack in Wireless Sensor Networks: A Lightweight Machine Learning Approach
Free accessDOAJ | 2023|Keywords: cyber security, IoT security, network security -
An Empirical Analysis of Incorrect Account Remediation in the Case of Broken Authentication
Free accessDOAJ | 2023|Keywords: Cyber security, internet security, security measurement -
Automated Incident Response for Industrial Control Systems Leveraging Software-defined Networking
Free accessFraunhofer Publica | 2019|Keywords: SDN security, ICS Security -
Temperature elevation in the human brain and skin with thermoregulation during exposure to RF energy
Free accessDOAJ | 2018|Keywords: Human safety, Safety guidelines -
An Overview of the Security Landscape of Virtual Mobile Networks
Free accessDOAJ | 2021|Keywords: Security, virtual mobile networks (VMNs) security, NFV security -
Small Modular Reactors and Advanced Reactor Security: Regulatory Perspectives on Integrating Physical and Cyber Security by Design to Protect Against Malicious Acts and Evolving Threats
Free accessDOAJ | 2020|Keywords: security by design, nuclear security, nuclear security regulations -
Circuit: A JavaScript Memory Heap-Based Approach for Precisely Detecting Cryptojacking Websites
Free accessDOAJ | 2022|Keywords: Browser security, web security -
Evaluating Performance of Web Application Security Through a Fuzzy Based Hybrid Multi-Criteria Decision-Making Approach: Design Tactics Perspective
Free accessDOAJ | 2020|Keywords: security assessment, security design, security tactics -
Conceptual Systems Security Requirements Analysis: Aerial Refueling Case Study
Free accessDOAJ | 2018|Keywords: security, security engineering, systems security engineering -
Research on security scenarios and security models for 6G networking
Free accessDOAJ | 2021|Keywords: network security, wireless communication security -
Intelligent Video Data Security: A Survey and Open Challenges
Free accessDOAJ | 2021|Keywords: Video data security, intelligent security, visual security -
5G wireless P2MP backhaul security protocol: an adaptive approach
Free accessDOAJ | 2019|Keywords: Security protocol, Formal security analysis
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.