Year of publication
Subject
Type of material
Licence
Language
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Efficient MPC with a Mixed Adversary
Free accessDataCite | 2020|Keywords: Security and privacy → Network security -
Assessment of the Impact of Information Security Awareness Training Methods on Knowledge, Attitude, and Behavior
Free accessDOAJ | 2022|Keywords: Information security awareness, security training, security management -
DomainPrio: Prioritizing Domain Name Investigations to Improve SOC Efficiency
Free accessDOAJ | 2022|Keywords: Network security, security operations, security operations centers -
Survey of smart contract security
Free accessDOAJ | 2020|Keywords: on-chain security, off-chain security, security analysis -
CloudStrike: Chaos Engineering for Security and Resiliency in Cloud Infrastructure
Free accessDOAJ | 2020|Keywords: Cloud security, security chaos engineering, security risk assessment -
A Lightweight PUF-Based Authentication Protocol Using Secret Pattern Recognition for Constrained IoT Devices
Free accessDOAJ | 2021|Keywords: hardware security, IoT security, lightweight security -
Cyber Security Maturity Assessment Framework for Technology Startups: A Systematic Literature Review
Free accessDOAJ | 2023|Keywords: Cyber security risk, cyber security maturity, cyber security framework, return of security investment -
Fingerprint-based crypto-biometric system for network security
Free accessSpringer Verlag | 2015|Keywords: Biometric security, Network security, Systems and Data Security, Security Science and Technology -
Security and Privacy Analysis of Mobile Health Applications: The Alarming State of Practice
Free accessDOAJ | 2018|Keywords: Communication system security, mobile security, application security -
Oracle Indistinguishability and Its Applications
Free accessDOAJ | 2023|Keywords: quantum security, classical security, oracle security -
Physical unclonable function: architectures, applications and challenges for dependable security
Free accessIET | 2020|Keywords: dependable security, security solutions, security of data, hardware-specific security primitive, desired security levels, telecommunication security -
Power maximisation technique for generating secret keys by exploiting physical layer security in wireless communication
Free accessIET | 2020|Keywords: secret key based security, physical layer security, communication security, keyless security, telecommunication security, secret key-based security -
Physical Layer Security for Beyond 5G: Ultra Secure Low Latency Communications
Free accessDOAJ | 2021|Keywords: Physical layer security, 6G security, beyond 5G security, security at layer-1 -
System-Agnostic Security Domains for Understanding and Prioritizing Systems Security Engineering Efforts
Free accessDOAJ | 2017|Keywords: Security domains, systems security engineering, security engineering -
A Customizable Framework for Prioritizing Systems Security Engineering Processes, Activities, and Tasks
Free accessDOAJ | 2017|Keywords: Systems security engineering, security engineering, security framework -
The defender's dilemma : charting a course toward cybersecurity
Free accessGWLB - Gottfried Wilhelm Leibniz Bibliothek | 2015|Keywords: COMPUTERS ; Internet ; Security, Computer networks ; Security measures ; Government policy, Computer networks ; Security measures, Industries ; Security measures -
Securing the Intermediate Data of Scientific Workflows in Clouds With ACISO
Free accessDOAJ | 2019|Keywords: Cloud security, intermediate data security, security strategy allocation -
Privacy‐preserving data integration scheme in industrial robot system based on fog computing and edge computing
Free accessDOAJ | 2024|Keywords: computer network security, security of data -
Power maximisation technique for generating secret keys by exploiting physical layer security in wireless communication
Free accessWiley | 2020|Keywords: keyless security, communication security, telecommunication security, secret key based security, secret key‐based security, physical layer security -
Information Security and Organizational Performance: Empirical Study of Korean Securities Industry
Free accessWiley | 2015|Keywords: security industry, Information security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.