Year of publication
Subject
Type of material
Licence
TIB reading rooms collection
LUH institutes collection
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
SDVS Sender-Privacy in the Multi-party Setting
Springer Verlag | 2024|Keywords: Systems and Data Security, Security Services, Mobile and Network Security -
Automated Cropland Fallow Algorithm (ACFA) for the Northern Great Plains of USA
Free accessDOAJ | 2024|Keywords: food security, water security -
XDRBG: A Proposed Deterministic Random Bit Generator Based on Any XOF
Free accessDOAJ | 2024|Keywords: forward security, backward security -
Threshold Implementations with Non-uniform Inputs
Springer Verlag | 2024|Keywords: Probing Security, Systems and Data Security, Security Services -
Security and Privacy Issues in Cloud and IoT Technology and Their Countermeasures
Springer Verlag | 2024|Keywords: Security, Security Science and Technology, Mobile and Network Security -
The Random Fault Model
Springer Verlag | 2024|Keywords: Physical Security, Systems and Data Security, Security Services -
Botnet sequential activity detection with hybrid analysis
Free accessDOAJ | 2024|Keywords: Network security, Information security -
Security risks of global software development life cycle: Industry practitioner's perspective
Wiley | 2024|Keywords: security risks, software security -
Advances in Optical Visual Information Security: A Comprehensive Review
Free accessDOAJ | 2024|Keywords: optical information security, information security -
Chatbot-Based Android Application Towards Security Using FCM
Springer Verlag | 2024|Keywords: Security, Systems and Data Security -
An Image Copyright Authentication Model Based on Blockchain and Digital Watermark
Springer Verlag | 2024|Keywords: Security Science and Technology, Security Services -
A Signcryption Approach to Address Security and Privacy Issues in Online Gaming Platforms
Springer Verlag | 2024|Keywords: Security, Security Science and Technology -
Investing in security-as-a-service for e-commerce infrastructure by small and medium enterprises: a Monte Carlo approach
Emerald Group Publishing | 2024|Keywords: Security investment, Security as a service -
Somalia Economic Update, Eighth Edition : Integrating Climate Change with Somalia's Development: The Case for Water
National licenceTIBKAT | 2024|Keywords: Food Security, Water Security -
Computer security - ESORICS 2023 / Gene Tsudik, Mauro Conti, Kaitai Liang, Georgios Smaragdakis, editors ; Part 1
TIBKAT | 2024|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Computer security - ESORICS 2023 / Gene Tsudik, Mauro Conti, Kaitai Liang, Georgios Smaragdakis, editors ; Part 2
TIBKAT | 2024|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Cognitive computing - ICCC 2023 : 7th international conference : held as part of the services conference federation, SCF 2023, Shenzhen, China, December 17-18, 2023 : proceedings
TIBKAT | 2024|Keywords: COMPUTERS / Security / General, COMPUTERS / Internet / Security, Computer security -
Emerging information security and applications : 4th international conference, EISA 2023, Hangzhou, China, December 6-7, 2023 : proceedings
TIBKAT | 2024|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Computer security - ESORICS 2023 / Gene Tsudik, Mauro Conti, Kaitai Liang, Georgios Smaragdakis, editors ; Part 3
TIBKAT | 2024|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
PQ-DPoL: An Efficient Post-Quantum Blockchain Consensus Algorithm
Springer Verlag | 2024|Keywords: Post-Quantum Security, Systems and Data Security, Mobile and Network Security -
A New Frontier in Digital Security: Verification for NFT Image Using Deep Learning-Based ConvNeXt Model in Quantum Blockchain
Springer Verlag | 2024|Keywords: digital security, Systems and Data Security, Mobile and Network Security -
Security Vulnerabilities in 5G Non-Stand-Alone Networks: A Systematic Analysis and Attack Taxonomy
Free accessDOAJ | 2024|Keywords: security -
Digital transformation, cyber security and resilience : Second International Conference, DIGILIENCE 2020, Varna, Bulgaria, September 30-October 2, 2020 ; revised selected papers
TIBKAT | 2024|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Secure Edge and Fog Computing Enabled AI for IoT and Smart Cities : Includes selected Papers from International Conference on Advanced Computing & Next-Generation Communication (ICACNGC 2022)
Springer Verlag | 2024|Keywords: Security systems. -
Comprehensive Examination of Version Number Attacks in IoT Networks: Nodes Hyperactivity as Specific Criterion
Free accessDeGruyter | 2024|Keywords: security -
The Metaweb : the next level of the Internet
TIBKAT | 2024|Keywords: COMPUTERS / Internet / Security -
Exploring the Imminence of Cyberterrorism Threat to National Security
Springer Verlag | 2024|Keywords: Systems and Data Security, Crime Control and Security, Security Science and Technology -
Image encryption algorithm based on improved iterative chaotic map with infinite collapses and Gray code
IOP Institute of Physics | 2024|Keywords: information security -
Research on substation intrusion event identification method based on MTF and CNN
IOP Institute of Physics | 2024|Keywords: perimeter security -
An Efficient Small Modulus Test and Its Applications to Delegated Computation Without Preprocessing
Springer Verlag | 2024|Keywords: Systems and Data Security, Security Services, Mobile and Network Security -
Digital Resilience: Navigating Disruption and Safeguarding Data Privacy
Springer Verlag | 2024|Keywords: Security systems. -
A review on client-server attacks and defenses in federated learning
Elsevier | 2024|Keywords: Security -
Security of federated learning in 6G era: A review on conceptual techniques and software platforms used for research and analysis
Elsevier | 2024|Keywords: Security -
Using chaos to encrypt images with reconstruction through deep learning model for smart healthcare
Elsevier | 2024|Keywords: Security -
HoneyTwin: Securing smart cities with machine learning-enabled SDN edge and cloud-based honeypots
Elsevier | 2024|Keywords: Security -
The Impact of Technology on Radicalisation to Violent Extremism and Terrorism in the Contemporary Security Landscape
Springer Verlag | 2024|Keywords: Global security, Systems and Data Security, Crime Control and Security, Security Science and Technology -
Cyber Malware : Offensive and Defensive Systems
Springer Verlag | 2024|Keywords: Security systems. -
Security Improvements of JPEG Images Using Image De-Identification
Free accessDOAJ | 2024|Keywords: security -
An Automated Home Security System Using Secure Message Queue Telemetry Transport Protocol
Wiley | 2024|Keywords: Home security -
Applied problems solved by information technology and software
TIBKAT | 2024|Keywords: Security systems. -
Social and Ethical Issues of the Military Use of Artificial Intelligence
Springer Verlag | 2024|Keywords: Security Science and Technology, Systems and Data Security -
Generalized antenna sequence spatial modulation (GASSM): a novel framework for enhanced PHY layer security and energy efficiency
Free accessDOAJ | 2024|Keywords: Security capacity, Physical layer security -
Ransomware Classification and Detection: A Supervised Machine Learning Approach
Springer Verlag | 2024|Keywords: Cyber security, Systems and Data Security -
Enhancing Patient Safety in Spain: Streamlining Adverse Event Detection in Occupational Healthcare Records
Free accessDOAJ | 2024|Keywords: patient safety, safety culture, Industrial safety. Industrial accident prevention -
Mobile, secure, and programmable networking : 9th international conference, MSPN 2023, Paris, France, October 26-27, 2023 : revised selected papers
TIBKAT | 2024|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Authentication, Authorization, Administration and Audit Impact on Digital Security
Springer Verlag | 2024|Keywords: Security, Digital Security -
XAI Human-Machine collaboration applied to network security
Free accessDOAJ | 2024|Keywords: network security, IoT security -
Neuro-fuzzy Vulnerability Evaluation According to Excellence Criteria
Springer Verlag | 2024|Keywords: Security Science and Technology, Systems and Data Security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.