Year of publication
Type of material
Licence
Language
TIB reading rooms collection
LUH institutes collection
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Enhancing SOC threat detection and classification with ML ; Melhorando a deteção e classificação de ameaças no SOC com ML
Free accessBASE | 2026|Keywords: Security Operation Centers, Security information and event management, Cyber security -
Secure software development life cycle ; Ciclo seguro de desenvolvimento de software
Free accessBASE | 2026|Keywords: Security -
Exploring hybrid security strategies in Ghana: State and private sector partnerships
Taylor & Francis Verlag | 2024|Keywords: Private security, state security, security partnership, security actors -
Artificial Intelligence for Cyber Security
Current Trends and Future ChallengesWiley | 2024|Keywords: Computer network security, information security, cyber security, application security, artificial intelligence‐based cyber security -
Understanding safety engineering practice: Comparing safety engineering practice as desired, as required, and as observed
Elsevier | 2024|Keywords: Safety practice, Safety framework, Safety process, Safety lifecycle, Safety improvements -
Exploring the role of assurance context in system security assurance evaluation: a conceptual model
Emerald Group Publishing | 2024|Keywords: Security assurance, Security evaluation, System security -
Ontology-Based Metrics Computation for System Security Assurance Evaluation
Free accessTaylor & Francis Verlag | 2024|Keywords: System security, security assurance, security metrics -
Cybercrime in India: An analysis of crime against women in ever expanding digital space
Wiley | 2024|Keywords: communication security, information security -
A multi-group assessment of safety culture among engineering students in the United Arab Emirates
Emerald Group Publishing | 2024|Keywords: Safety culture, Safety behavior, Safety awareness, Safety attitude -
Cloud and Edge Networking Security
Wiley | 2024|Keywords: cloud networking security, edge networking security, security cloud, SIM‐based security -
Examining the need for a high level of therapeutic security at a regional forensic mental health service in Aotearoa New Zealand
Taylor & Francis Verlag | 2024|Keywords: therapeutic security, high security, relational security, procedural security, physical security -
High performance packet classification algorithm for network security systems using modified grid-of-tries
American Institute of Physics | 2024|Keywords: SECURITY -
Key based secured cryptosystems used for online data sharing on the cloud
American Institute of Physics | 2024|Keywords: SECURITY -
Risk based inspection and maintenance strategy for subsea pipelines using Bayesian influence diagram
American Institute of Physics | 2024|Keywords: SECURITY -
Enhancement of KASUMI algorithm by adding hamming code
American Institute of Physics | 2024|Keywords: SECURITY -
A low-cost multi-agent system for physical security in smart buildings
American Institute of Physics | 2024|Keywords: SECURITY -
Security from Legacy Wireless Systems to 5G Networks
Wiley | 2024|Keywords: security attacks, security services, wireless network security, wireless security architectures -
Employees’ BYOD Security Policy Compliance in the Public Sector
Taylor & Francis Verlag | 2024|Keywords: Security policy compliance, BYOD security policy, security culture, public sector security policy, security training and awareness -
The Arctic as a regional security complex
Taylor & Francis Verlag | 2024|Keywords: regional security complex, security -
UpCy: Safely Updating Outdated Dependencies (Summary)
DataCite | 2024|Keywords: Security maintenance, Security Vulnerabilities -
Intelligence oversight in times of transnational impunity : who will watch the watchers?
Free accessTIBKAT | 2024|Keywords: Internal security, National security, POLITICAL SCIENCE / Political Freedom & Security / Human Rights, POLITICAL SCIENCE / Political Freedom & Security / International Security, POLITICAL SCIENCE / Political Freedom & Security / Intelligence -
Cyber security using modern technologies : artificial intelligence, blockchain and quantum cryptography
TIBKAT | 2024|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Role of data security technology in healthcare in protecting confidential patient information and complying with regulations
American Institute of Physics | 2024|Keywords: CYBER SECURITY -
Wannacry ransomware attack: The enemy lies under your blanket
American Institute of Physics | 2024|Keywords: NETWORK SECURITY -
Dark Clouds on the Horizon? Effects of Cloud Storage on Security Breaches
Taylor & Francis Verlag | 2024|Keywords: Cloud Security, Security Breaches -
Matrix Profile data mining for BGP anomaly detection
Elsevier | 2024|Keywords: Cyber security, Internet security, Network security -
Data protection in IoT using CoAP based on enhanced DTLS
American Institute of Physics | 2024|Keywords: CYBER SECURITY -
Web-based biometric authentication system for web applications (WBAS)
American Institute of Physics | 2024|Keywords: NETWORK SECURITY -
Ethereum smart contract security: Design, risks and protection approaches
American Institute of Physics | 2024|Keywords: CYBER SECURITY -
Navigating leadership styles through qualitative exploration for enhanced safety in the construction sector
Elsevier | 2024|Keywords: Safety leadership, Safety leadership styles, Safety climate, Safety performance -
Deepfake impact, security threats and potential preventions
American Institute of Physics | 2024|Keywords: NETWORK SECURITY -
Service centric attribute based block level two step encryption scheme for improved cloud security
American Institute of Physics | 2024|Keywords: CYBER SECURITY -
Comparative study of computer security methodologies for countering cyber attacks
American Institute of Physics | 2024|Keywords: CYBER SECURITY -
EFTS: An encryption file transfer system applying advanced encryption standard (AES) algorithm
American Institute of Physics | 2024|Keywords: NETWORK SECURITY -
A reliable hybrid cryptosystem for colour image encryption
American Institute of Physics | 2024|Keywords: NETWORK SECURITY -
Improving healthcare data integrity using blockchain technology
American Institute of Physics | 2024|Keywords: CYBER SECURITY -
A secure and cost effective platform for employee management system using lightweight standalone framework over El Gamal encryption algorithm
American Institute of Physics | 2024|Keywords: CYBER SECURITY -
Grey hole attack in mobile ad-hoc network mitigation and protection
American Institute of Physics | 2024|Keywords: NETWORK SECURITY -
DDoS attack detection in SDN: A special attention towards optimization model
American Institute of Physics | 2024|Keywords: NETWORK SECURITY -
Ransomware malware: Attacks and preventions
American Institute of Physics | 2024|Keywords: NETWORK SECURITY -
A new secure mapping scheme on elliptic curve cryptography for internet of things
American Institute of Physics | 2024|Keywords: NETWORK SECURITY -
Automated privilege escalation enumeration and execution script for linux
American Institute of Physics | 2024|Keywords: NETWORK SECURITY -
Creating a Process for Equitable Action to Prevent School and Community Violence
Taylor & Francis Verlag | 2024|Keywords: School safety, community safety, equitable safety -
The “Five Eyes” Intelligence Sharing Relationship : A Contemporary Perspective
TIBKAT | 2024|Keywords: Security, International. -
A study of wearable IoT device (smartwatch) advantages, vulnerabilities and protection
American Institute of Physics | 2024|Keywords: NETWORK SECURITY -
Improvisation of data security in mobile based data by using novel blowfish algorithm over DES algorithm
American Institute of Physics | 2024|Keywords: CYBER SECURITY -
An alternative DOS attack on windows
American Institute of Physics | 2024|Keywords: NETWORK SECURITY -
Reduced plaintext for ciphers (RPC) algorithm
American Institute of Physics | 2024|Keywords: NETWORK SECURITY
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.