Year of publication
Type of media
Source
Type of material
Licence
Language
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Security threats to critical infrastructure: the human factor
Free accessSpringer Verlag | 2018|Keywords: Critical infrastructure security, Security awareness, Cyber security training, Work-based security training, Security threats against critical infrastructure -
Survey on cyberspace security
Springer Verlag | 2015|Keywords: cyberspace security, information security, network security, information system security, information content security -
Building a security reference architecture for cloud systems
Springer Verlag | 2015|Keywords: Security reference architecture, Security patterns, Security requirements, IaaS security -
Power System Security Assessment and Enhancement: A Bibliographical Survey
Springer Verlag | 2020|Keywords: Power system security, Security enhancement, Static security assessment, Dynamic security assessment -
Water, energy and food interactions—Challenges and opportunities
Springer Verlag | 2013|Keywords: water security, energy security, food security -
A comparison of security requirements engineering methods
Springer Verlag | 2009|Keywords: Security requirement, Security requirement engineering, Framework for security requirement engineering -
Securing ARP and DHCP for mitigating link layer attacks
Springer Verlag | 2017|Keywords: Network security, DHCP security, ARP security -
Global linkages among energy, food and water: an economic assessment
Free accessSpringer Verlag | 2016|Keywords: Water security, Food security -
A big data analytics approach to combat telecommunication vulnerabilities
Springer Verlag | 2017|Keywords: Mobile network security, SS7 security, Cyber security, Machine learning based security -
A framework and tool for the assessment of information security risk, the reduction of information security cost and the sustainability of information security culture
Springer Verlag | 2021|Keywords: Information security culture, Information security assessment, Information security cost, Information security evaluation, Information security, The ARCS security framework -
The water–energy–food–environmental security nexus: moving the debate forward
Springer Verlag | 2020|Keywords: Water security, Energy security, Food security, Environmental security -
A study on security strategy in ICT convergence environment
Springer Verlag | 2014|Keywords: Security characteristic, Security level, Security advancement step, Security strategy -
Understanding the Chinese Data Security Law
Springer Verlag | 2021|Keywords: Data security administration, Data security review, Data security obligations, Security -
Road tunnel fire safety and risk: a review
Free accessSpringer Verlag | 2015|Keywords: Road tunnel fire safety, Fire safety, Safety -
Engineering and validating security to make cloud secure
Springer Verlag | 2017|Keywords: Cloud security, Security requirements, Security engineering, Security index, Quality Control, Reliability, Safety and Risk -
The effect of disfluency on consumer perceptions of information security
Springer Verlag | 2015|Keywords: Information security, Security -
A security evaluation framework for cloud security auditing
Springer Verlag | 2017|Keywords: Cloud security, Security metrics, Security index -
A study on effects of security risks on acceptance of enterprise cloud service: moderating of employment and non-employment using PLS multiple group analysis
Springer Verlag | 2016|Keywords: Security, Security risk -
New approach for ensuring cloud computing security: using data hiding methods
Springer Verlag | 2016|Keywords: access security, stored data security -
Safety benefits of integrated pedestrian protection systems
Springer Verlag | 2016|Keywords: Traffic safety, Active safety, Passive safety -
Unified and integrated authentication and key agreement scheme for e-governance system without verification table
Springer Verlag | 2019|Keywords: computer security, network security -
Fingerprint-based crypto-biometric system for network security
Free accessSpringer Verlag | 2015|Keywords: Biometric security, Network security, Systems and Data Security, Security Science and Technology -
Towards an integrated risk analysis security framework according to a systematic analysis of existing proposals
Free accessSpringer Verlag | 2024|Keywords: information security management, security system, security risk assessment and management -
An ontology-based approach to security pattern selection
Springer Verlag | 2016|Keywords: Security pattern, security requirement, security engineering -
Evaluating the effectiveness of the security quality requirements engineering (SQUARE) method: a case study using smart grid advanced metering infrastructure
Springer Verlag | 2012|Keywords: Security requirements engineering method evaluation, Advanced metering infrastructure (AMI) security, Smart grid security, Security quality requirements engineering (SQUARE) method -
Security Requirements Elicitation from Airline Turnaround Processes
Springer Verlag | 2018|Keywords: Security risk management, Security patterns, Security requirements engineering -
Semantic hierarchies for extracting, modeling, and connecting compliance requirements in information security control standards
Free accessSpringer Verlag | 2019|Keywords: Security policy, Security requirements, Security control standards -
Reactive and Proactive Methods for Database Protection against Logical Inference Attacks
Springer Verlag | 2022|Keywords: cyber security, security monitoring, security management -
A strengthening plan for enterprise information security based on cloud computing
Springer Verlag | 2013|Keywords: Cloud security, Security threats, Enterprise information security -
Safety: Intrinsic & Extrinsic
Free accessSpringer Verlag | 2016|Keywords: Safety System, Safety Valve, Pedestrian Safety -
Overview of 5G security technology
Springer Verlag | 2018|Keywords: 5G security, physical layer security, network slice security -
Investigation of Demographic Factors in Construction Employees’ Safety Perceptions
Springer Verlag | 2019|Keywords: construction safety, safety hazards, safety perception -
From the analysis of European accident data to safety assessment for planning: the role of good vehicles in urban area
Free accessSpringer Verlag | 2017|Keywords: Goods vehicles safety, Pedestrian safety, Safety models, Safety plan -
The pluralization of policing and the rise of private policing in China
Springer Verlag | 2009|Keywords: Security Service, Public Security, Private Security, Security Guard -
Education in IT Security: A Case Study in Banking Industry
Free accessSpringer Verlag | 2013|Keywords: IT security education, security awareness, corporate security -
The Budapest Convention and the General Data Protection Regulation: acting in concert to curb cybercrime?
Free accessSpringer Verlag | 2020|Keywords: Computer security, Data security, Security -
Not all areas are equal: analysis of citations in information security research
Springer Verlag | 2020|Keywords: Science of security, Information security, Cyber security -
Tasks of providing information security in distributed computing networks
Springer Verlag | 2016|Keywords: information security, security threats, security policy -
Regulatory practices for nuclear power plants in India
Springer Verlag | 2013|Keywords: nuclear safety, periodic safety review, radiation safety, environmental safety -
A statistical and distributed packet filter against DDoS attacks in Cloud environment
Springer Verlag | 2018|Keywords: Cloud security, network security -
A Systematic Review and Analytical Evaluation of Security Requirements Engineering Approaches
Springer Verlag | 2019|Keywords: Security requirements, Security requirements engineering (SRE), Software security -
Intelligent Security Strategy Based on the Selection of the Computer and Neural Network Architecture
Springer Verlag | 2022|Keywords: security strategy, information security, sufficient security, infrastructure security, Internet of Things security maturity model, security algorithms -
Evaluation of Low-Cost Thermal Laser Stimulation for Data Extraction and Key Readout
Springer Verlag | 2020|Keywords: IC security, FPGA security, Systems and Data Security -
Hidost: a static machine-learning-based detector of malicious files
Free accessSpringer Verlag | 2016|Keywords: Security, Systems and Data Security, Security Science and Technology -
A framework for evaluating security risk in system design
Free accessSpringer Verlag | 2022|Keywords: System security modeling, Security risk analysis, Security metrics, Security design exploration -
Security Requirements and Solutions in Electronic Health Records: Lessons Learned from a Comparative Study
Springer Verlag | 2009|Keywords: Security model, Security requirements, Information security -
Research priorities for managing the impacts and dependencies of business upon food, energy, water and the environment
Free accessSpringer Verlag | 2016|Keywords: Food security, Energy security, Water security -
Commentary on newly released measures for cyber security review of China
Springer Verlag | 2020|Keywords: Measures for Cyber Security Review in China, Cyber Security Law, State Security, Security -
Internet-of-Things Security and Vulnerabilities: Taxonomy, Challenges, and Practice
Springer Verlag | 2018|Keywords: IoT security, Systems and Data Security -
Benchmarking of Hardware Trojans and Maliciously Affected Circuits
Springer Verlag | 2017|Keywords: Hardware security, Systems and Data Security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.