Year of publication
Subject
Type of material
Licence
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
MEMS sensors as physical unclonable functions
DataCite | 2019|Keywords: IoT security, hardware security -
Blockchain-based Access Management Mechanisms
Free accessORKG Comparisons | 2022|Keywords: Cryptography and Security -
ACPC: Efficient revocation of pseudonym certificates using activation codes
Elsevier | 2018|Keywords: Security credential management system (SCMS), Security -
Mitigating application layer distributed denial of service attacks via effective trust management
IET | 2010|Keywords: telecommunication security, security of data -
Swimming pool safety detection device based on computer vision
SPIE | 2022|Keywords: security incidents, security detection -
Real time dataset generation framework for intrusion detection systems in IoT
Elsevier | 2020|Keywords: IoT security -
Security Attacks in Wireless Sensor Networks: A Survey
Springer Verlag | 2018|Keywords: Security breaches, Security mechanism, Systems and Data Security -
Research on Information Security Algorithm of Wireless Communication System
National licenceTrans Tech Publications | 2012|Keywords: Information Security, Security Algorithm -
Everest: Towards a Verified, Drop-in Replacement of HTTPS
Free accessDataCite | 2017|Keywords: Security -
A Comparative Analysis of Industrial Cybersecurity Standards
Free accessDOAJ | 2023|Keywords: security controls, security standards, security requirements -
Distribution network reconfiguration comprehensively considering N−1 security and network loss
Free accessIET | 2018|Keywords: N−1 security criterion, N−1 security margin, power system security, distribution system security region, security margin constraints -
Benign false-data injection as a moving-target defense to secure mobile wireless communications
Elsevier | 2019|Keywords: Wireless Security, Network Security -
Key management scheme of distributed IoT devices based on blockchains
Free accessWiley | 2023|Keywords: network security, network security code -
Analysis of short blocklength codes for secrecy
Free accessDOAJ | 2018|Keywords: Physical-layer security, Security measures -
The Research on Security Technology of Mobile Internet
National licenceTrans Tech Publications | 2012|Keywords: Network Security, Security Technology -
An Android-Based Covert Channel Framework on Wearables Using Status Bar Notifications
Springer Verlag | 2018|Keywords: Security, Systems and Data Security -
Discussion on Multi-dimensional Security System of See-Air-Land in Nuclear Power Plant
Springer Verlag | 2017|Keywords: Nuclear security, Information security, Airspace security, Sea security, Multi-dimensional integrated security system, Quality Control, Reliability, Safety and Risk, Systems and Data Security -
An enhanced anonymity resilience security protocol for vehicular ad-hoc network with Scyther simulation
Elsevier | 2020|Keywords: Security attacks -
Physical-layer security in Internet of Things based on compressed sensing and frequency selection
Free accessIET | 2017|Keywords: physical layer security, security method, CS security model, telecommunication security, information security -
Secure Machine to Machine Communication in Industrial Internet of Things
Springer Verlag | 2019|Keywords: Security, Systems and Data Security, Crime Control and Security, Security Science and Technology -
Cooperative communication design of physical layer security enhancement with social ties in random networks
Elsevier | 2022|Keywords: Physical layer security, Reliability and security -
Embedded firewall for on-chip bus transactions
Elsevier | 2022|Keywords: Communication system security, Data security -
Physical‐layer security in Internet of Things based on compressed sensing and frequency selection
Free accessWiley | 2017|Keywords: security method, CS security model, information security, telecommunication security, physical layer security -
An Efficient Network Attack Visualization Using Security Quad and Cube
Free accessWiley | 2011|Keywords: security situational awareness, Network security visualization -
Image encryption algorithm based on 2D hyperchaotic map
Elsevier | 2021|Keywords: Security analysis -
Combined image encryption and steganography technique for enhanced security using multiple chaotic maps
Elsevier | 2023|Keywords: Wireless security, Security models -
Secure upgraded spatial modulation for wireless transmission systems
Elsevier | 2023|Keywords: Physical layer security, Security -
The Feasibility of Launching Rogue Transmitter Attacks in Indoor Visible Light Communication Networks
Free accessOnline Contents | 2017|Keywords: Physical layer security, Network security -
A survey on Bluetooth Low Energy security and privacy
Elsevier | 2021|Keywords: Embedded systems security, Mobile and wireless security -
Only play in your comfort zone: interaction methods for improving security awareness on mobile devices
Online Contents | 2015|Keywords: Security zones, Mobile security -
Interoperability, Standards, and Cyber Security
Wiley | 2012|Keywords: interoperability, standards, cyber security, cyber security, and improving methodology, smart grid cyber security -
Dynamic security regions in power systems with active overexcitation limiters
Elsevier | 2020|Keywords: Dynamic security assessment, Security regions -
Concepts and characteristics of security margin based on dynamic security region
Elsevier | 2022|Keywords: Dynamic security region, Security margin -
Iterated Hash Functions in Practice
Springer Verlag | 2021|Keywords: Systems and Data Security, Principles and Models of Security, Mobile and Network Security -
Encryption Schemes
Springer Verlag | 2021|Keywords: Systems and Data Security, Principles and Models of Security, Mobile and Network Security -
Enhancing Security and Ownership Protection of Neural Networks Using Watermarking Techniques: A Systematic Literature Review Using PRISMA
Springer Verlag | 2024|Keywords: Security and ownership protection, Systems and Data Security, Security Services, Principles and Models of Security, Mobile and Network Security -
„Mimowolny stabilizator”. Kościół rzymskokatolicki jako gwarant bezpieczeństwa wewnętrznego PRL
Free accessDOAJ | 2021|Keywords: interial security, community security, social security, cultural security -
Mobile Data Issues for the Enterprise
Wiley | 2014|Keywords: Data security, Infrastructure security, Mobile security -
Enhanced risk-based SCOPF formulation balancing operation cost and expected voluntary load shedding
Elsevier | 2015|Keywords: Security-constrained optimal power flow, Risk-based security-constrained optimal power flow -
Contemporary Improvements in Enhancing the Watermarking Techniques: A Deep Perspective
Springer Verlag | 2024|Keywords: Systems and Data Security, Security Services, Principles and Models of Security, Mobile and Network Security -
Role of Blockchain and Watermarking Toward Cybersecurity
Springer Verlag | 2024|Keywords: Systems and Data Security, Security Services, Principles and Models of Security, Mobile and Network Security -
Efficient MPC with a Mixed Adversary
Free accessDataCite | 2020|Keywords: Security and privacy → Network security -
Bloom filter applications in network security: A state-of-the-art survey
Elsevier | 2013|Keywords: Security -
Platform independent overall security architecture in multi-processor system-on-chip integrated circuits for use in mobile phones and handheld devices
Elsevier | 2007|Keywords: Security architecture, Wireless security, Platform-independent security architecture -
Enhancing the security using SRB18 method of Embedding Computing
Elsevier | 2020|Keywords: security -
Assessment of the Impact of Information Security Awareness Training Methods on Knowledge, Attitude, and Behavior
Free accessDOAJ | 2022|Keywords: Information security awareness, security training, security management
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.