Year of publication
Subject
Type of material
Licence
TIB reading rooms collection
LUH institutes collection
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Practical Covertly Secure MPC for Dishonest Majority - Or: Breaking the SPDZ Limits
Tema Archive | 2013|Keywords: Sicherheit, aktive Sicherheit, beweisbare Sicherheit -
Enabling security functions with SDN: A feasibility study
Elsevier | 2015|Keywords: Network security, Software-defined networking security, SDN security -
Apparatus: A framework for security analysis in internet of things systems
Elsevier | 2018|Keywords: IoT Security, Security requirements, Smart cities security -
Denial of service attack detection through machine learning for the IoT
Free accessTaylor & Francis Verlag | 2020|Keywords: security, network security -
Impact of static and dynamic load models on security margin estimation methods
Elsevier | 2021|Keywords: Dynamic security margins, Dynamic security limits, Security assessment, Security margin estimation -
Security and Privacy Service Level Agreement composition for Internet of Things systems on top of standard controls
Elsevier | 2022|Keywords: Cloud security, IoT security, Security and privacy, Security SLA -
Climate and security: evidence, emerging risks, and a new agenda
Online Contents | 2014|Keywords: National Security, Security Dimension, Human Security -
The Security of Multiple Encryption in the Ideal Cipher Model
Tema Archive | 2014|Keywords: Sicherheit, beweisbare Sicherheit -
Planning for climate change: the security community’s precautionary principle
Online Contents | 2009|Keywords: National Security, Security Actor, Security Council, Security Institution, Security Community -
Novel security models, metrics and security assessment for maritime vessel networks
Elsevier | 2021|Keywords: Security analysis, Security metrics, Security models -
A survey on registration hijacking attack consequences and protection for session initiation protocol (SIP)
Elsevier | 2020|Keywords: Network security, Sip security -
The fast image encryption algorithm based on lifting scheme and chaos
Elsevier | 2020|Keywords: Information security, Security analysis -
On the design of secure primitives for real world applications
Elsevier | 2020|Keywords: Hardware security, Systems security, Security engineering, Computers and networks security -
Physical unclonable functions based secret keys scheme for securing big data infrastructure communication
Elsevier | 2019|Keywords: IoT Security, Zigbee security, Hardware security -
A framework and tool for the assessment of information security risk, the reduction of information security cost and the sustainability of information security culture
Online Contents | 2021|Keywords: Information security, Information security evaluation, The ARCS security framework, Information security culture, Information security assessment, Information security cost -
Model-based evaluation of combinations of Shuffle and Diversity MTD techniques on the cloud
Elsevier | 2019|Keywords: Security analysis, Security metrics, Security modeling -
The national security field under conditions of armed aggression of the Russian Federation against Ukraine in 2022
Free accessDOAJ | 2022|Keywords: security, security space, international (global) security, national security, military security, information security -
OSCAR: Object security architecture for the Internet of Things
Elsevier | 2014|Keywords: Communication security, Object security, End-to-end security -
Government regulations in cyber security: Framework, standards and recommendations
Elsevier | 2018|Keywords: Cyber security, Information security -
Climate and security: evidence, emerging risks, and a new agenda
Online Contents | 2014|Keywords: National Security, Security Dimension, Human Security -
An Exploratory Study Gathering Security Requirements for the Software Development Process
Free accessDOAJ | 2023|Keywords: software security, security software process, security software methodologies, security testing -
All-Or-Nothing data protection for ubiquitous communication: Challenges and perspectives
Elsevier | 2019|Keywords: Data security, Multimedia security -
Planning for climate change: the security community’s precautionary principle
Online Contents | 2009|Keywords: National Security, Security Actor, Security Council, Security Institution, Security Community -
The WEF nexus and rural household security in Zimbabwe and South Africa
Taylor & Francis Verlag | 2023|Keywords: water security, food security, energy security -
Security of Satellite-Terrestrial Communications: Challenges and Potential Solutions
Free accessDOAJ | 2022|Keywords: Security, network security, satellite security, communications security, NTN security -
Social network security: Issues, challenges, threats, and solutions
Elsevier | 2017|Keywords: Security and privacy, Security threats -
Retrospective Analysis of the Main Indicators of Ukraine's Financial Security
Free accessDOAJ | 2019|Keywords: security, financial security, financial security indicators, bank security, monetary security -
Water security and the pursuit of food, energy, and earth systems resilience
Taylor & Francis Verlag | 2018|Keywords: water security, energy security, food security -
Role of Explainable AI in 6G Security*
Wiley | 2023|Keywords: explainable security, AI security, 6G security, security of XAI -
A Study on Acceptance Procedure Improvement of Web Application by Outsourcing for Mobile Service
Online Contents | 2016|Keywords: Security architecture, Information security, Security management -
Cyber security in the Smart Grid: Survey and challenges
Elsevier | 2012|Keywords: Cyber security, Security protocols -
Semantic security against web application attacks
Elsevier | 2013|Keywords: Application security, Semantic security -
A machine-learning based probabilistic perspective on dynamic security assessment
Elsevier | 2020|Keywords: Security Rules, Dynamic Security Assessment, Probabilistic Security Assessment -
A dangerous synergy: energy securitization, great power rivalry and strategic stability in the Asian century
Taylor & Francis Verlag | 2013|Keywords: Energy security, Asia-Pacific security, economic security -
Blockchain‐Based Security Solutions for IoT Systems
Wiley | 2018|Keywords: IoT security, security architecture, network security -
Network security assessment using a semantic reasoning and graph based approach
Elsevier | 2017|Keywords: Network security, Security ontology -
MAPE-K/MAPE-SAC: An interaction framework for adaptive systems with security assurance cases
Elsevier | 2020|Keywords: Security assurance cases, Security certification -
Experimental Study to Analyze the Security Performance in Wireless LANs
Online Contents | 2015|Keywords: Security strength, Security protocols, WLAN security -
Systematic survey of advanced metering infrastructure security: Vulnerabilities, attacks, countermeasures, and future vision
Elsevier | 2022|Keywords: Security vulnerability, Security threat, Security attack -
TARP: Ticket-based address resolution protocol
Elsevier | 2007|Keywords: Network security, ARP security -
An automated perception and prediction of heart disease based on machine learning
American Institute of Physics | 2022|Keywords: NETWORKS & SECURITY -
Cloud security engineering: Early stages of SDLC
Elsevier | 2016|Keywords: Cloud security, Security vulnerabilities -
A new unified image encryption algorithm based on a lifting transformation and chaos
Elsevier | 2020|Keywords: Information security, Security analysis -
Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation
Tema Archive | 2013|Keywords: Sicherheit, beweisbare Sicherheit -
Key based secured cryptosystems used for online data sharing on the cloud
American Institute of Physics | 2024|Keywords: SECURITY -
High performance packet classification algorithm for network security systems using modified grid-of-tries
American Institute of Physics | 2024|Keywords: SECURITY -
Metaverse intrusion detection of wormhole attacks based on a novel statistical mechanism
Elsevier | 2023|Keywords: IoT security, Network security, Mobile cloud security, Security for Metaverse, Virtualization security, Cyber-Physical security -
The area-efficient gate level information flow tracking schemes of digital circuit with multi-level security lattice
Elsevier | 2023|Keywords: Hardware security, Security lattice, Security label -
Swarm Intelligence inspired Intrusion Detection Systems — A systematic literature review
Elsevier | 2021|Keywords: Network security, Data security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.