Year of publication
Type of material
Licence
TIB reading rooms collection
LUH institutes collection
Synonyms were used for: IT-Sicherheit
Search without synonyms: keywords:("IT-Sicherheit")
Used synonyms:
- computersicherheit
- cyber security
- cybersecurity
- cybersicherheit
- it security
-
An Empirical Study of the Technology Transfer Potential of EU Security and Trust R&D Projects
British Library Conference Proceedings | 2014|Keywords: Cyber security -
An Integrated Framework for Innovation Management in Cyber Security and Privacy
British Library Conference Proceedings | 2014|Keywords: Cyber security -
Practical-oriented protocols for privacy-preserving outsourced big data analysis: Challenges and future research directions
Online Contents | 2016|Keywords: Computersicherheit -
Addressing the class imbalance problem in Twitter spam detection using ensemble learning
Online Contents | 2016|Keywords: Computersicherheit -
Causality reasoning about network events for detecting stealthy malware activities
Online Contents | 2016|Keywords: Computersicherheit -
File-system Intrusion Detection by Preserving MAC DTS: A Loadable Kernel Module based Approach for LINUX Kernel 2.6.x
British Library Conference Proceedings | 2009|Keywords: Cyber security -
External Monitoring of Endpoint Configuration Compliance
British Library Conference Proceedings | 2009|Keywords: Cyber security -
Meta-models for Misuse Cases
British Library Conference Proceedings | 2009|Keywords: Cyber security -
Quantifying Security Threats and Their Impact
British Library Conference Proceedings | 2009|Keywords: Cyber security -
Debugging Support for Security Properties of Software Architectures
British Library Conference Proceedings | 2009|Keywords: Cyber security -
Security-oriented Program Transformations [Extended Abstract]
British Library Conference Proceedings | 2009|Keywords: Cyber security -
A multifaceted evaluation of the reference model of information assurance & security
Online Contents | 2016|Keywords: Computersicherheit -
Stalking the stalkers - detecting and deterring stalking behaviours using technology: A review
Online Contents | 2017|Keywords: Computersicherheit -
User Identification Via Process Profiling
British Library Conference Proceedings | 2009|Keywords: Cyber security -
The Case for Prevention-based, Host-resident Defenses in the Modern PCS Network
British Library Conference Proceedings | 2009|Keywords: Cyber security -
Defending Financial Infrastructures Through Early Warning Systems: The Intelligence Cloud Approach
British Library Conference Proceedings | 2009|Keywords: Cyber security -
National Cyber Security Research Assessment and Roadmap
British Library Conference Proceedings | 2009|Keywords: Cyber security -
Funktionale Sicherheit 4.0. IT-Security stellt neue Safety-Herausforderungen an Maschinenhersteller und Betreib
Tema Archive | 2014|Keywords: IT-Sicherheit
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.