Year of publication
Subject
Type of material
Licence
TIB reading rooms collection
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Design Considerations for Building Credible Security Testbeds: Perspectives from Industrial Control System Use Cases
Taylor & Francis Verlag | 2021|Keywords: security simulations, security modelling, cyber security simulations -
Challenges and performance metrics for security operations center analysts: a systematic review
Taylor & Francis Verlag | 2020|Keywords: Security operations center, cyber security, security analysts -
Bayesian Stackelberg games for cyber-security decision support
Elsevier | 2021|Keywords: Cyber-security, Security games, Security investment -
On the design of secure primitives for real world applications
Elsevier | 2020|Keywords: Hardware security, Systems security, Security engineering, Computers and networks security -
Digital transformation and challenges to data security and privacy
TIBKAT | 2021|Keywords: Database security, Computer security -
Securing state reconstruction under sensor and actuator attacks: Theory and design
Elsevier | 2020|Keywords: Cyber–physical security, Security monitoring -
Decision support for selecting information security controls
Taylor & Francis Verlag | 2018|Keywords: Information security, security controls, optimisation of security portfolio -
Teachers' and students' attitudes towards information security: A qualitative study
Wiley | 2020|Keywords: information security, information security behavior, information security motivation, information security tools -
A parallel image encryption algorithm based on the piecewise linear chaotic map and hyper-chaotic map
Online Contents | 2018|Keywords: Image security, Security analysis -
A parallel image encryption algorithm based on the piecewise linear chaotic map and hyper-chaotic map
Online Contents | 2018|Keywords: Image security, Security analysis -
CAAVI-RICS model for observing the security of distributed IoT and edge computing systems
Elsevier | 2020|Keywords: Cyber-security, Distributed security -
Information security management in SOCs and SICs
IOS Press | 2018|Keywords: Information security, information security management, Security Operations Center, Security Intelligence Center, information security incident -
Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
Elsevier | 2009|Keywords: Information security, End-user security behaviors, Security policy compliance -
Security versus convenience? An experimental study of user misperceptions of wireless internet service quality
Elsevier | 2011|Keywords: Information security, Security/convenience tradeoff, Security engineering -
Scientific and Methodological Approach to Assessing the Level of Banks’ Financial Security
Springer Verlag | 2020|Keywords: Financial security, Financial security components, Security of deposit transactions, Security of credit transactions, Security of cash transactions, Security of investment transactions, Security of currency transactions, A financial security indicator, Level of financial security -
Machine learning-enhanced hybrid cryptography and image steganography algorithm for securing cloud data
IOS Press | 2024|Keywords: Data security, security -
Not all areas are equal: analysis of citations in information security research
Online Contents | 2019|Keywords: Information security, Science of security, Cyber security -
Examining Factors that Influence the Existence of Heinrich's Safety Triangle Using Site‐Specific H&S Data from More than 25,000 Establishments
Wiley | 2018|Keywords: safety pyramid, safety triangle -
The BPSec Security Mechanism
Wiley | 2023|Keywords: BPSec Security Mechanism, Security Operations, Security Contexts, Security Blocks, Other Security Blocks -
Stackelberg game modeling of cloud security defending strategy in the case of information leaks and corruption
Elsevier | 2020|Keywords: Cloud security, Security threat modeling -
The Design of the Enterprise Network Security Solutions
National licenceTrans Tech Publications | 2014|Keywords: Security, Network Security, Windows Security -
A framework for secure IT operations in an uncertain and changing environment
Elsevier | 2017|Keywords: Information security, IT security management, Security investment decisions -
Cyber breach response that actually works : organizational approach to managing residual risk
TIBKAT | 2020|Keywords: Computer security ; Management, Computer security -
CARMEN: A framework for the verification and diagnosis of the specification of security requirements in cyber-physical systems
Elsevier | 2021|Keywords: Security, Security requirements, Security verification -
Continuous fields: Enhanced in-vehicle anomaly detection using machine learning models
Elsevier | 2020|Keywords: Controller area network security, Automotive security, Security monitoring -
Immersive technology-driven investigations on influence factors of cognitive load incurred in construction site hazard recognition, analysis and decision making
Elsevier | 2021|Keywords: Construction safety, Safety hazard, Safety education -
Designed on Information Security Systems for Mobile Databases
National licenceTrans Tech Publications | 2014|Keywords: Network Security, Information Security, Data Security, Security Systems -
A quantitative examination of the intellectual profile and evolution of information security from 1965 to 2015
Online Contents | 2015|Keywords: Computer security, Network security, Cyber security -
Security Policy Overview
Wiley | 2023|Keywords: Security Policy Model, Security Operation Lifecycle, Security Misconfiguration, Security Policy Engine -
Hardware/software security co-verification and vulnerability detection: An information flow perspective
Elsevier | 2023|Keywords: Hardware and software security co-verification, Information flow security, Security model, Security property -
A game-theoretic approach to model and quantify the security of cyber-physical systems
Elsevier | 2017|Keywords: Security modeling, Security evaluation -
A Review of Risk Matrices Used in Acute Hospitals in England
Wiley | 2019|Keywords: safety risk assessment, Patient safety -
IBE with tight security against selective opening and chosen-ciphertext attacks
Online Contents | 2020|Keywords: Tight security reduction, Selective opening security, Chosen-ciphertext security -
Analysis of vehicle’s safety envelope under car-following model
Elsevier | 2017|Keywords: Safety envelope, Safety index -
Blockchain security in virtual environment
IOS Press | 2022|Keywords: Blockchain security, virtual security -
Social Resilience and Critical Infrastructure Systems
Springer Verlag | 2017|Keywords: Security, Crime Control and Security, Systems and Data Security, Security Science and Technology -
Cyberspace and Innocent Passage: Regulations for the Security of the Coastal State
TIBKAT | 2020|Keywords: National security, Computer security -
Data Mining and Association Rules to Determine Twitter Trends
TIBKAT | 2020|Keywords: National security, Computer security -
Information Assets Security Management
Wiley | 2012|Keywords: data security, Information security, security management, Information system security -
3D computational ghost imaging (Invited Paper) [8899-1]
British Library Conference Proceedings | 2013|Keywords: Quantum security, Security, Information security -
Your memory is working against you: How eye tracking and memory explain habituation to security warnings
Elsevier | 2016|Keywords: Security warnings, Behavioral information security -
Monte Carlo-Based Localization for Kidnapped Robot Problem
TIBKAT | 2020|Keywords: National security, Computer security -
Truly random number generation: an example [8899-30]
British Library Conference Proceedings | 2013|Keywords: Quantum security, Security, Information security -
Determination of Optimal Procedures for Maintenance and Repair Operations of the GDU-620 Garmin Applied to the DA20C-1 Aircraft
TIBKAT | 2020|Keywords: National security, Computer security -
Essential elements lacking in security proofs for quantum key distribution (Invited Paper) [8899-21]
British Library Conference Proceedings | 2013|Keywords: Quantum security, Security, Information security -
Securing the Perimeter : Deploying Identity and Access Management with Free Open Source Software
TIBKAT | 2018|Keywords: Security, Computer security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.