Year of publication
Type of media
Source
Subject
Type of material
Licence
Language
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
A Localization Game in Wireless Sensor Networks
British Library Conference Proceedings | 2010|Keywords: Security -
Methods and Algorithms for Infinite Bayesian Stackelberg Security Games (Extended Abstract)
British Library Conference Proceedings | 2010|Keywords: Security -
Security Interdependencies for Networked Control Systems with Identical Agents
British Library Conference Proceedings | 2010|Keywords: Security -
When Do Firms Invest in Privacy-Preserving Technologies?
British Library Conference Proceedings | 2010|Keywords: Security -
Design of Network Topology in an Adversarial Environment
British Library Conference Proceedings | 2010|Keywords: Security -
The Password Game: Negative Externalities from Weak Password Practices
British Library Conference Proceedings | 2010|Keywords: Security -
gPath: A Game-Theoretic Path Selection Algorithm to Protect Tor's Anonymity
British Library Conference Proceedings | 2010|Keywords: Security -
Effective Multimodel Anomaly Detection Using Cooperative Negotiation
British Library Conference Proceedings | 2010|Keywords: Security -
ISPs and Ad Networks against Botnet Ad Fraud
British Library Conference Proceedings | 2010|Keywords: Security -
Robust Control in Sparse Mobile Ad-Hoc Networks
British Library Conference Proceedings | 2010|Keywords: Security -
Optimal Information Security Investment with Penetration Testing
British Library Conference Proceedings | 2010|Keywords: Security -
Disperse or Unite? A Mathematical Model of Coordinated Attack
British Library Conference Proceedings | 2010|Keywords: Security -
Adversarial Control in a Delay Tolerant Network
British Library Conference Proceedings | 2010|Keywords: Security -
Towards a Game Theoretic Authorisation Model
British Library Conference Proceedings | 2010|Keywords: Security -
A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense Model
British Library Conference Proceedings | 2010|Keywords: Security -
Tracking Games in Mobile Networks
British Library Conference Proceedings | 2010|Keywords: Security -
Context-Aware Privacy Design Pattern Selection
British Library Conference Proceedings | 2010|Keywords: Computer security, Security -
An Insider Threat Prediction Model
British Library Conference Proceedings | 2010|Keywords: Computer security, Security -
Attacking Image Recognition Captchas: A Naive but Effective Approach
British Library Conference Proceedings | 2010|Keywords: Computer security, Security -
Analyzing Information Security Awareness through Networks of Association
British Library Conference Proceedings | 2010|Keywords: Computer security, Security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.