Year of publication
Type of media
Source
Subject
Type of material
Licence
Language
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Agile incident response (AIR): Improving the incident response process in healthcare
Elsevier | 2021|Keywords: Security Incident, Information Security -
A systematic approach and tool support for GSN-based safety case assessment
Elsevier | 2017|Keywords: Safety case, Safety case assessment, Functional safety -
An empirical study of security warnings from static application security testing tools
Elsevier | 2019|Keywords: Security warnings, Static application security testing tools -
Dynamic Security Metrics for Software-Defined Network-based Moving Target Defense
Elsevier | 2020|Keywords: Dynamic security metrics, Security measurement -
Defending RFID authentication protocols against DoS attacks
Elsevier | 2010|Keywords: RFID security, Forward security -
Stakeholder involvement, motivation, responsibility, communication: How to design usable security in e-Science
Elsevier | 2007|Keywords: Security, Security design, Usable security -
Cloud computing adoption framework: A security framework for business clouds
Elsevier | 2015|Keywords: CCAF multi-layered security, Security for business clouds -
A new provably secure authentication and key agreement protocol for SIP using ECC
Elsevier | 2008|Keywords: CK security model, Provable security -
Emerging topics in defending networked systems
Elsevier | 2021|Keywords: Network security, Information security -
Security analysis and improvement of some biometric protected templates based on Bloom filters
Elsevier | 2016|Keywords: Biometric security -
Consolidated Identity Management System for secure mobile cloud computing
Elsevier | 2014|Keywords: Cloud computing security, Security attacks -
Securing the internet of vehicles through lightweight block ciphers
Elsevier | 2020|Keywords: Automotive security, Security -
MARISMA-BiDa pattern: Integrated risk analysis for big data
Elsevier | 2020|Keywords: Information security, Security standards -
The direct and indirect effect of organizational justice on employee intention to comply with information security policy: The case of Ethiopian banks
Elsevier | 2023|Keywords: Information security, Cyber security, Information security management -
How “What you think you know about cybersecurity” can help users make more secure decisions
Elsevier | 2023|Keywords: Information security, Objective security knowledge, Subjective security knowledge -
Secure and efficient public key multi-channel broadcast encryption schemes
Elsevier | 2019|Keywords: Selective security, Adaptive security -
A security policy language for wireless sensor networks
Elsevier | 2008|Keywords: Data security, Security policy, Security policy composition -
Management of risk in the information age
Elsevier | 2004|Keywords: Information security, Information security management, Information security requirements -
An evaluation of videogame network architecture performance and security
Elsevier | 2021|Keywords: Network security, Videogame security -
PLC-SEIFF: A programmable logic controller security incident forensics framework based on automatic construction of security constraints
Elsevier | 2020|Keywords: Security incidents, Security constraints -
A survey on device-to-device (D2D) communication: Architecture and security issues
Elsevier | 2016|Keywords: Security, InternetProtocol Security (IP Sec) -
Passive- and not active-risk tendencies predict cyber security behavior
Elsevier | 2020|Keywords: Cyber security, Security -
Intrusion detection using an ensemble of intelligent paradigms
Elsevier | 2004|Keywords: Computer security, Network security -
Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the U.S. and South Korea
Elsevier | 2011|Keywords: Security countermeasures, End user security, Information security management -
Universally composable and customizable post-processing for practical quantum key distribution
Elsevier | 2010|Keywords: Security quantification, Universally composable security IT security -
A holistic approach to improving safety for battery energy storage systems
Elsevier | 2024|Keywords: Process safety, Battery safety, Thermal safety -
Motivating IS security compliance: Insights from Habit and Protection Motivation Theory
Elsevier | 2012|Keywords: Information security policy compliance, Information security -
Improving cloud network security using the Tree-Rule firewall
Elsevier | 2013|Keywords: Network security, Cloud security -
Factors affecting perception of information security and their impacts on IT adoption and security practices
Elsevier | 2011|Keywords: Information security, Security practices -
Constructing road safety performance indicators using Fuzzy Delphi Method and Grey Delphi Method
Elsevier | 2010|Keywords: Safety performance indicator, Regional road safety, Urban road safety, Highway safety -
Distributed temporal logic for the analysis of security protocol models
Elsevier | 2011|Keywords: Security protocols, Security protocol analysis, Security protocol models -
Integration of the OAuth and Web Service family security standards
Elsevier | 2013|Keywords: Security Token Service, WS-Security -
Selecting a Cloud Service Provider in the age of cybercrime
Elsevier | 2013|Keywords: Security, Security assurance -
A novel proxy-oriented public auditing scheme for cloud-based medical cyber physical systems
Elsevier | 2020|Keywords: Security analysis, Provable security -
Expanding the Gordon-Loeb model to cyber-insurance
Elsevier | 2021|Keywords: Security investment, Security economics -
Evaluating the cyber security readiness of organizations and its influence on performance
Elsevier | 2021|Keywords: Cyber security, Security performance -
Security requirements engineering framework for software product lines
Elsevier | 2010|Keywords: Security requirements engineering, Security software engineering, Security requirement -
PICADOR: End-to-end encrypted Publish–Subscribe information distribution with proxy re-encryption
Elsevier | 2016|Keywords: Security -
Effects of sanctions, moral beliefs, and neutralization on information security policy violations across cultures
Elsevier | 2019|Keywords: Information security policy violations, Information security -
Anomaly detection and identification scheme for VM live migration in cloud infrastructure
Elsevier | 2015|Keywords: Security -
Post-quantum lightweight identity-based two-party authenticated key exchange protocol for Internet of Vehicles with probable security
Elsevier | 2021|Keywords: Security, Provable security -
A technique to circumvent SSL/TLS validations on iOS devices
Elsevier | 2016|Keywords: Security, iOS security -
VehicleLang: A probabilistic modeling and simulation language for modern vehicle IT infrastructures
Elsevier | 2022|Keywords: Cyber security, Vehicular security -
A qualitative analysis of software security patterns
Elsevier | 2006|Keywords: Security patterns, Software security, Security architecture -
Automatic, verifiable and optimized policy-based security enforcement for SDN-aware IoT networks
Elsevier | 2022|Keywords: Security -
Protecting the communication: Data protection and security measures under telecommunications regulations in the digital age
Elsevier | 2014|Keywords: Security, Cyber security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.