Year of publication
Subject
Type of material
Licence
Language
TIB reading rooms collection
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Tips for Consumers: How to Travel Safely on the Information Superhighway
Springer Verlag | 2019|Keywords: Systems and Data Security, Crime Control and Security, Security Science and Technology, Security Services, Mobile and Network Security -
Cyber-vigilance and digital trust : cyber security in the era of cloud computing and IoT
TIBKAT | 2019|Keywords: Computer security, COMPUTERS ; Security ; General -
A Study on Smartwork Security Technology Based on Cloud Computing Environment
Online Contents | 2015|Keywords: Security analysis, Security element -
Diagnostics of an output interface of a safety-related system with safety PLC
Online Contents | 2017|Keywords: Safety PLC, Safety integrity, Safety function -
Matrix Profile data mining for BGP anomaly detection
Elsevier | 2024|Keywords: Cyber security, Internet security, Network security -
Applied incident response
TIBKAT | 2020|Keywords: Computer security, COMPUTERS / Security / Networking -
A framework and tool for the assessment of information security risk, the reduction of information security cost and the sustainability of information security culture
Springer Verlag | 2021|Keywords: Information security culture, Information security assessment, Information security cost, Information security evaluation, Information security, The ARCS security framework -
Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies
TIBKAT | 2017|Keywords: Computer security, COMPUTERS ; Security ; General, Security measures, Computer networks ; Security measures -
A blockchain-based secure healthcare scheme with the assistance of unmanned aerial vehicle in Internet of Things
Elsevier | 2020|Keywords: Security -
Cyber-physical systems security: Limitations, issues and future trends
Elsevier | 2020|Keywords: Cyber-security threats, Security, Security and performance analysis -
Study on Information Security of Network-Based Manufacturing Environment
National licenceTrans Tech Publications | 2014|Keywords: Network Security, Security Management -
Time-Delay Attacks in Network Systems
Springer Verlag | 2018|Keywords: Security, Crime Control and Security, Security Science and Technology -
Security of the Internet of Things: perspectives and challenges
Tema Archive | 2014|Keywords: Sicherheit -
Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures
Tema Archive | 2013|Keywords: Sicherheit, beweisbare Sicherheit -
A stochastic model of attack process for the evaluation of security metrics
Elsevier | 2013|Keywords: Cyber security, Security metrics, Quantitative security evaluation -
Cryptography : Recent Advances and Future Developments
Free accessGWLB - Gottfried Wilhelm Leibniz Bibliothek | 2021|Keywords: Network security -
SecIVo: a quantitative security evaluation framework for internet voting schemes
Online Contents | 2016|Keywords: Security requirements, Security evaluation -
Approximate Computing and Its Application to Hardware Security
Springer Verlag | 2018|Keywords: Security, Crime Control and Security, Security Science and Technology -
A new method of evaluating robust power system security against uncertainties
Online Contents | 2015|Keywords: probabilistic security assessment, power system security, deterministic security assessment -
An online power system static security assessment module using multi-layer perceptron and radial basis function network
Elsevier | 2015|Keywords: Power system security, Security assessment -
A collaborative policy-based security scheme to enforce resource access controlling mechanism
Online Contents | 2019|Keywords: Security policy, Android system security, Security profile -
A novel approach to manage cloud security SLA incidents
Elsevier | 2016|Keywords: Security SLAs, Cloud security -
A new method of evaluating robust power system security against uncertainties
Wiley | 2015|Keywords: probabilistic security assessment, power system security, deterministic security assessment -
Authenticated Encryption: How Reordering Can Impact Performance
Tema Archive | 2012|Keywords: Sicherheit, beweisbare Sicherheit -
Security analysis of OpenDayLight, ONOS, RoseMary and RYU SDN controllers
Free accessFraunhofer Publica | 2016|Keywords: security analysis, controller security, network security -
Electrical product compliance and safety engineering ; Volume 2
TIBKAT | 2021|Keywords: Technische Sicherheit -
Everlasting Multi-party Computation
Tema Archive | 2013|Keywords: Sicherheit, immerwährende Sicherheit -
Security Optimization of DF Relay Selection Strategy Under Outdated Scenarios
Online Contents | 2021|Keywords: Physical layer security, Security outage probability, Average security capacity -
The Impact of Ethereum Throughput and Fees on Transaction Latency During ICOs
Free accessDataCite | 2020|Keywords: Security and privacy → Database and storage security, Security and privacy → Economics of security and privacy, Security and privacy → Human and societal aspects of security and privacy -
CyberGuarder: A virtualization security assurance architecture for green cloud computing
Elsevier | 2011|Keywords: Virtual security appliance, Security isolation -
Influences on ICT teachers knowledge and routines in a technical e-safety context
Elsevier | 2017|Keywords: e-Safety, e-Safety behaviour -
Measure-Independent Characterization of Contrast Optimal Visual Cryptography Schemes
British Library Conference Proceedings | 2014|Keywords: Database security, Computer security, Information theoretic security -
Security Risk Management for the Internet of Things : Technologies and Techniques for IoT Security, Privacy and Data Protection
Free accessTIBKAT | 2020|Keywords: Computer security -
SENTINEL: Securing Legacy Firefox Extensions
Tema Archive | 2015|Keywords: Web-Browser-Sicherheit, Browser-Sicherheit -
A machine learning low‐dropout regulator‐assisted differential power analysis attack countermeasure with voltage scaling
Wiley | 2023|Keywords: hardware security, security analysis -
Review of Cyber Security for Power Trading and Communication Systems
Springer Verlag | 2022|Keywords: Cyber security, Power trading security, Security and performance, Security technology, Network security, Systems and Data Security -
Security analysis of the decoy method with the Bennett–Brassard 1984 protocol for finite key lengths
Tema Archive | 2014|Keywords: Sicherheit -
Generic modelling of security awareness in agent based systems
Elsevier | 2013|Keywords: Security awareness, Security modelling -
Security, privacy and trust in Internet of Things: The road ahead
Elsevier | 2014|Keywords: Security -
Cyber-Physical Threat Intelligence for Critical Infrastructures Security : Securing Critical Infrastructures in Air Transport, Water, Gas, Healthcare, Finance and Industry
Free accessTIBKAT | 2021|Keywords: Network security -
Cryptography : Recent Advances and Future Developments
Free accessTIBKAT | 2021|Keywords: Network security -
Detection of Algebraic Manipulation in the Presence of Leakage
British Library Conference Proceedings | 2014|Keywords: Database security, Computer security, Information theoretic security -
New Lower Bounds for Privacy in Communication Protocols
British Library Conference Proceedings | 2014|Keywords: Database security, Computer security, Information theoretic security -
Corporate security in film: Beyond the green shack out back
Online Contents | 2016|Keywords: Security systems, Security management -
On (k, n) Visual Cryptography Scheme with t Essential Parties
British Library Conference Proceedings | 2014|Keywords: Database security, Computer security, Information theoretic security -
Leakage Resilience of the Blom's Key Distribution Scheme
British Library Conference Proceedings | 2014|Keywords: Database security, Computer security, Information theoretic security -
Modulus Computational Entropy
British Library Conference Proceedings | 2014|Keywords: Database security, Computer security, Information theoretic security -
Application-Layer Security for the WoT: Extending CoAP to Support End-to-End Message Security for Internet-Integrated Sensing Applications
Springer Verlag | 2013|Keywords: CoAP security, end-to-end application-layer security, message security, granular security, Systems and Data Security -
How to Construct Strongly Secure Network Coding Scheme
British Library Conference Proceedings | 2014|Keywords: Database security, Computer security, Information theoretic security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.