Year of publication
Type of media
Source
Subject
Type of material
Licence
Language
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Image steganography for authenticity of visual contents in social networks
Online Contents | 2017|Keywords: Information security, Multimedia security -
IBE with tight security against selective opening and chosen-ciphertext attacks
Online Contents | 2020|Keywords: Tight security reduction, Selective opening security, Chosen-ciphertext security -
Artificial intelligence in cyber security: research advances, challenges, and opportunities
Online Contents | 2021|Keywords: Security Methods, Cyber Security -
Security experts’ capability design for future internet of things platform
Online Contents | 2015|Keywords: Security job, Security competency, Security occupation -
The Utility of Information Security Training and Education on Cybersecurity Incidents: An empirical evidence
Online Contents | 2019|Keywords: Information security training, Information security incidents, Information security management -
Implicit authentication protocol and self-healing key management for WBANs
Online Contents | 2018|Keywords: Backward security, Forward security -
Implicit authentication protocol and self-healing key management for WBANs
Online Contents | 2018|Keywords: Backward security, Forward security -
An Intelligent Tree-Based Intrusion Detection Model for Cyber Security
Online Contents | 2021|Keywords: Security features, Cyber security -
Testing TLS using planning-based combinatorial methods and execution framework
Online Contents | 2018|Keywords: Security testing, Security protocols -
Testing TLS using planning-based combinatorial methods and execution framework
Online Contents | 2018|Keywords: Security testing, Security protocols -
A review of cyber security risk assessment methods for SCADA systems
Online Contents | 2016|Keywords: Data security, Computer security, Safety and security measures -
A comparison of security requirements engineering methods
Online Contents | 2009|Keywords: Framework for security requirement engineering, Security requirement engineering, Security requirement -
On the Security of A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing
Online Contents | 2021|Keywords: Security protocol, Information security -
A model of digital identity for better information security in e-learning systems
Online Contents | 2021|Keywords: Information security, Security and security tool -
Building a security reference architecture for cloud systems
Online Contents | 2015|Keywords: Security reference architecture, Security patterns, Security requirements, IaaS security -
“A framework for development of secure software”
Online Contents | 2013|Keywords: Security design template, Security engineering process, Security design engineering, Security requirement engineering -
ECC Based Lightweight Secure Message Conveyance Protocol for Satellite Communication in Internet of Vehicles (IoV)
Online Contents | 2020|Keywords: Data security, Navigation and information security -
A Secure and Efficient V2V Authentication Method in Heavy Traffic Environment
Online Contents | 2016|Keywords: Vehicular security system, Security authentication, IoT security -
Security quality model: an extension of Dromey’s model
Online Contents | 2013|Keywords: Application security, Security, Security engineering, Security quality model -
A Framework for Translating a High Level Security Policy into Low Level Security Mechanisms
Online Contents | 2010|Keywords: security policy, security mangement, network security, security modeling
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.