Year of publication
Type of media
Subject
Type of material
Licence
Language
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Role of Explainable AI in 6G Security*
Wiley | 2023|Keywords: explainable security, AI security, 6G security, security of XAI -
Blockchain‐Based Security Solutions for IoT Systems
Wiley | 2018|Keywords: IoT security, security architecture, network security -
State of Art of Security and Risk in Wireless Environment Along with Healthcare Case Study
Wiley | 2023|Keywords: cyber security, security attacks, security models, security & privacy -
Security Infrastructure for Cyber Attack Targeted Networks and Services
Springer Verlag | 2022|Keywords: Security and protection, Network security, Server security, Cloud security, Device security, Security services, Infrastructure security -
Security from Legacy Wireless Systems to 5G Networks
Wiley | 2024|Keywords: security attacks, security services, wireless network security, wireless security architectures -
Software Defined Mobile Network Security
Wiley | 2015|Keywords: Security, Mobile network security, Security architecture -
Top Threats to Cloud: A Three-Dimensional Model of Cloud Security Assurance
Springer Verlag | 2021|Keywords: Cloud security model, Cloud security requirements, Cloud security threats, Cloud security vulnerabilities, Cloud security solution -
Physical Layer Security for UAV Communications
Wiley | 2020|Keywords: wireless network security, physical layer security, security breaches -
Tips for Consumers: How to Travel Safely on the Information Superhighway
Springer Verlag | 2019|Keywords: Systems and Data Security, Crime Control and Security, Security Science and Technology, Security Services, Mobile and Network Security -
Time-Delay Attacks in Network Systems
Springer Verlag | 2018|Keywords: Security, Crime Control and Security, Security Science and Technology -
Approximate Computing and Its Application to Hardware Security
Springer Verlag | 2018|Keywords: Security, Crime Control and Security, Security Science and Technology -
Application-Layer Security for the WoT: Extending CoAP to Support End-to-End Message Security for Internet-Integrated Sensing Applications
Springer Verlag | 2013|Keywords: CoAP security, end-to-end application-layer security, message security, granular security, Systems and Data Security -
Constructing Safety on Sites
Wiley | 2016|Keywords: safety interventions, safety management, safety culture -
Communications Security in Embedded Systems
Wiley | 2013|Keywords: Security services, Security implementation, Security techniques, Security attacks -
Research on Database Security Technology
Springer Verlag | 2012|Keywords: Database security, Security system, Security technology, Security agreement -
Review of Cyber Security for Power Trading and Communication Systems
Springer Verlag | 2022|Keywords: Cyber security, Power trading security, Security and performance, Security technology, Network security, Systems and Data Security -
Perfectly-Secure MPC Tolerating General Adversaries
Springer Verlag | 2022|Keywords: Security Services, Systems and Data Security, Principles and Models of Security, Mobile and Network Security -
Introduction
Springer Verlag | 2022|Keywords: Security Services, Systems and Data Security, Principles and Models of Security, Mobile and Network Security -
Secret Sharing
Springer Verlag | 2022|Keywords: Security Services, Systems and Data Security, Principles and Models of Security, Mobile and Network Security -
VoIP FMS: a comprehensive Voice over IP Fraud Management System : user/developer guide
TIBKAT | 2013|Keywords: Sicherheit -
Internet of Things and Wireless Physical Layer Security: A Survey
Springer Verlag | 2017|Keywords: Physical layer security (PLS), Wireless security techniques, Security attacks and challenges, Systems and Data Security -
Extended Protocol Using Keyless Encryption Based on Memristors
Springer Verlag | 2020|Keywords: Security and privacy, Security protocol for encryption, Security evaluation -
Security Rule Check
Springer Verlag | 2017|Keywords: Hardware security, Security vulnerability, Security rule checking, Design security, Systems and Data Security -
Complexity and Cybercomplexity
Springer Verlag | 2022|Keywords: Security, Security Science and Technology, Crime Control and Security -
Public Key-Based Lightweight Swarm Authentication
Springer Verlag | 2018|Keywords: Security, Crime Control and Security, Security Science and Technology -
Measuring ROI in a Job Safety Training Program at a Major Food Retailer
Wiley | 2014|Keywords: safety, job safety, safety training -
Secure Data Transmission Through Reliable Vehicles in VANET Using Optimal Lightweight Cryptography
Springer Verlag | 2019|Keywords: Security, Systems and Data Security, Security Science and Technology -
Security Features in Mobile Communications Networks
Wiley | 2021|Keywords: security algorithms, security context, security interworking -
Security Challenges in the Smart Grid Communication Infrastructure
Wiley | 2018|Keywords: network security requirements, security solutions, logical security architecture, security challenges -
A New Cyber Security Framework Towards Secure Data Communication for Unmanned Aerial Vehicle (UAV)
Springer Verlag | 2018|Keywords: Cyber security, Systems and Data Security, Security -
Removable Media, USB Devices, Smartphones and Other Mobile Devices
Springer Verlag | 2022|Keywords: Systems and Data Security, Security -
eSROP Attack: Leveraging Signal Handler to Implement Turing-Complete Attack Under CFI Defense
Springer Verlag | 2023|Keywords: Signal security, Systems and Data Security, Security Services, Mobile and Network Security -
Ground Network Security
Springer Verlag | 2023|Keywords: Mobile and Network Security, Systems and Data Security, Security Science and Technology -
Airborne Network Security
Springer Verlag | 2023|Keywords: Mobile and Network Security, Systems and Data Security, Security Science and Technology -
Space Network Security
Springer Verlag | 2023|Keywords: Mobile and Network Security, Systems and Data Security, Security Science and Technology -
Introduction to SAGIN Security
Springer Verlag | 2023|Keywords: Mobile and Network Security, Systems and Data Security, Security Science and Technology -
Data Center Facilities
Springer Verlag | 2024|Keywords: Systems and Data Security, Security Services, Mobile and Network Security -
Security
Wiley | 2021|Keywords: network access security, security edge protection proxy, network domain security, service‐based architecture domain security, security -
Security Procedures
Wiley | 2014|Keywords: network domain security, network access security, security procedures -
Security Attacks in Wireless Sensor Networks: A Survey
Springer Verlag | 2018|Keywords: Security breaches, Security mechanism, Systems and Data Security -
Contemporary Improvements in Enhancing the Watermarking Techniques: A Deep Perspective
Springer Verlag | 2024|Keywords: Systems and Data Security, Security Services, Principles and Models of Security, Mobile and Network Security -
Role of Blockchain and Watermarking Toward Cybersecurity
Springer Verlag | 2024|Keywords: Systems and Data Security, Security Services, Principles and Models of Security, Mobile and Network Security -
An Android-Based Covert Channel Framework on Wearables Using Status Bar Notifications
Springer Verlag | 2018|Keywords: Security, Systems and Data Security -
Enhancing Security and Ownership Protection of Neural Networks Using Watermarking Techniques: A Systematic Literature Review Using PRISMA
Springer Verlag | 2024|Keywords: Security and ownership protection, Systems and Data Security, Security Services, Principles and Models of Security, Mobile and Network Security -
Iterated Hash Functions
Springer Verlag | 2021|Keywords: Systems and Data Security, Principles and Models of Security, Mobile and Network Security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.