Year of publication
Subject
Type of material
Licence
TIB reading rooms collection
LUH institutes collection
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Enhancing SOC threat detection and classification with ML ; Melhorando a deteção e classificação de ameaças no SOC com ML
Free accessBASE | 2026|Keywords: Security Operation Centers, Security information and event management, Cyber security -
Secure software development life cycle ; Ciclo seguro de desenvolvimento de software
Free accessBASE | 2026|Keywords: Security -
Artificial Intelligence for Cyber Security
Current Trends and Future ChallengesWiley | 2024|Keywords: Computer network security, information security, cyber security, application security, artificial intelligence‐based cyber security -
CPS4CIP 2023
TIBKAT | 2024Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
DPM 2023
TIBKAT | 2024Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Exploring the role of assurance context in system security assurance evaluation: a conceptual model
Emerald Group Publishing | 2024|Keywords: Security assurance, Security evaluation, System security -
Computer security ; Part 2: CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AL, and SECAI
TIBKAT | 2024|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
SECAL 2023
TIBKAT | 2024Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
TAURIN 2023
TIBKAT | 2024Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
SECPRE 2023
TIBKAT | 2024Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
PriST-AI 2023
TIBKAT | 2024Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
WASP 2023
TIBKAT | 2024Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Computer security ; Part 1: CyberICS, DPM, CBT, and SECPRE
TIBKAT | 2024|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
ADIoT 2023
TIBKAT | 2024Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
CyberICPS 2023
TIBKAT | 2024Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
SecAssure 2023
TIBKAT | 2024Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
CBT 2023
TIBKAT | 2024Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
A Glance View on Cloud Infrastructures Security and Solutions
Wiley | 2024|Keywords: application security, network security, host security, data security -
Cybercrime in India: An analysis of crime against women in ever expanding digital space
Wiley | 2024|Keywords: communication security, information security -
Machine learning-enhanced hybrid cryptography and image steganography algorithm for securing cloud data
IOS Press | 2024|Keywords: Data security, security -
Cloud and Edge Networking Security
Wiley | 2024|Keywords: cloud networking security, edge networking security, security cloud, SIM‐based security -
A Holistic Analysis of Internet of Things (IoT) Security: Principles, Practices, and New Perspectives
Free accessDOAJ | 2024|Keywords: security, communication security, device security, service security -
Employees’ BYOD Security Policy Compliance in the Public Sector
Taylor & Francis Verlag | 2024|Keywords: Security policy compliance, BYOD security policy, security culture, public sector security policy, security training and awareness -
Machine learning for cyber security : 5th International Conference, ML4CS 2023, Yanuca Island, Fiji, December 4-6, 2023 : proceedings
TIBKAT | 2024|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
UpCy: Safely Updating Outdated Dependencies (Summary)
DataCite | 2024|Keywords: Security maintenance, Security Vulnerabilities -
Cyber security using modern technologies : artificial intelligence, blockchain and quantum cryptography
TIBKAT | 2024|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Matrix Profile data mining for BGP anomaly detection
Elsevier | 2024|Keywords: Cyber security, Internet security, Network security -
Dark Clouds on the Horizon? Effects of Cloud Storage on Security Breaches
Taylor & Francis Verlag | 2024|Keywords: Cloud Security, Security Breaches -
New Openings at the Dawn of the Interregnum of Critical Security Studies: The Promises of Visual and Vernacular Turns
Free accessDOAJ | 2024|Keywords: vernacular security, visual security, critical security studies -
Organizational perspectives on converged security operations
Emerald Group Publishing | 2024|Keywords: Security collaborative optimization, Corporate security -
An Empirical Examination of Employee Information Security Advice Sharing
Taylor & Francis Verlag | 2024|Keywords: Security advice sharing, security climate, information security awareness -
GDPR compliance through standard security controls: An automated approach
IOS Press | 2024|Keywords: security policy, security control framework -
Software Mitigation of RISC-V Spectre Attacks
Springer Verlag | 2024|Keywords: hardware security, system security, Systems and Data Security, Security Services, Mobile and Network Security -
The zero trust framework : threat hunting & quantum mechanics
TIBKAT | 2024|Keywords: COMPUTERS / Internet / Security, COMPUTERS / Networking / Security, Computer security -
Safeguarding the IoT: Taxonomy, security solutions, and future research opportunities
Wiley | 2024|Keywords: security attacks, security framework -
SCFI: Efficient forward fine-grained control flow integrity based on coarse-grained ISA extensions
Elsevier | 2024|Keywords: System security, Software and application security -
Network awareness of security situation information security measurement method based on data mining
IOS Press | 2024|Keywords: information security, Network security situation -
Summary
Springer Verlag | 2024|Keywords: Systems and Data Security, Security Services, Mobile and Network Security -
Backup
Springer Verlag | 2024|Keywords: Systems and Data Security, Security Services, Mobile and Network Security -
The Architecture of IT Cloud Services
Springer Verlag | 2024|Keywords: Systems and Data Security, Security Services, Mobile and Network Security -
Enhancing Cybersecurity in Industrial Control Systems Through GRC Framework: Principles, Regulations, and Risk Assessment
Springer Verlag | 2024|Keywords: Cyber security, Information security, Security Science and Technology, Systems and Data Security -
IT Support Services
Springer Verlag | 2024|Keywords: Systems and Data Security, Security Services, Mobile and Network Security -
Data Center Security and Resiliency
Springer Verlag | 2024|Keywords: Systems and Data Security, Security Services, Mobile and Network Security -
Storage and Virtualization
Springer Verlag | 2024|Keywords: Systems and Data Security, Security Services, Mobile and Network Security -
Compute and Virtualization
Springer Verlag | 2024|Keywords: Systems and Data Security, Security Services, Mobile and Network Security -
Conversational AI
Security Features, Applications, and Future Scope at Cloud PlatformWiley | 2024|Keywords: security issues, centric security systems, advanced security model -
Network
Springer Verlag | 2024|Keywords: Systems and Data Security, Security Services, Mobile and Network Security -
Effects of a behavior-based safety observation program: Promoting safe behaviors and safety climate at work
IOS Press | 2024|Keywords: safety program, Construction safety, safety climate -
An Investigation of the Factors That Influence Information Security Culture in Government Organizations in Bhutan
Taylor & Francis Verlag | 2024|Keywords: Information security behavior, information security culture -
Informational inequality: the role of resources and attributes in information security awareness
Emerald Group Publishing | 2024|Keywords: Data security, Information security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.