Year of publication
Subject
Type of material
Licence
TIB reading rooms collection
LUH institutes collection
1–50 of 16,028 hits
Sort by:
Sort by:
-
Cyber Crisis Management : das Praxishandbuch zu Krisenmanagement und Krisenkommunikation
TIBKAT | 2024|Keywords: Datensicherheit -
Data, Privacy Laws and Firm Production : Evidence from the GDPR
TIBKAT | 2024|Keywords: Datensicherheit -
Digital sicher in eine nachhaltige Zukunft : Tagungsband zum 19. Deutschen IT-Sicherheitskongress
TIBKAT | 2023Keywords: Datensicherheit -
How Good Are Privacy Guarantees? Platform Architecture and Violation of User Privacy
TIBKAT | 2023|Keywords: Datensicherheit -
"Zero Cost'' Majority Attacks on Permissionless Blockchains
TIBKAT | 2023|Keywords: Datensicherheit -
Public and private governance of cybersecurity : challenges and potential
GWLB - Gottfried Wilhelm Leibniz Bibliothek | 2023|Keywords: Datensicherheit -
Digital Health Platform Governance Document Register
Free accessDataCite | 2023|Keywords: Datensicherheit -
More security, less harm? : exploring the link between security measures and direct costs of cyber incidents within firms using PLS-PM
DataCite | 2022|Keywords: Datensicherheit -
Multimedia communications, services and scurity : 11th International Conference, MCSS 2022, Kraków, Poland, November 3–4, 2022, proceedings
TIBKAT | 2022|Keywords: DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME) -
IT-Grundschutz Arbeitshandbuch : DIN ISO/IEC 27001, DIN ISO/IEC 27002, BSI-Standards 200-1/2/3
TIBKAT | 2022|Keywords: Datensicherheit -
IT-Sicherheit : Technologien und Best Practices für die Umsetzung im Unternehmen
TIBKAT | 2022|Keywords: Datensicherheit -
IT-Sicherheit : Technologien und Best Practices für die Umsetzung im Unternehmen
TIBKAT | 2022|Keywords: Datensicherheit -
Chuchotage: In-line Software Network Protocol Translation for (D)TLS Pegah
TIBKAT | 2022|Keywords: DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME) -
New Results of Breaking the CLS Scheme from ACM-CCS 2014
TIBKAT | 2022|Keywords: DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME) -
Query-Efficient Black-Box Adversarial Attack with Random Pattern Noises
TIBKAT | 2022|Keywords: DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME) -
Using Blockchains for Censorship-Resistant Bootstrapping in Anonymity Networks
TIBKAT | 2022|Keywords: DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME) -
Conditional Cube Attacks on Full Members of KNOT-AEAD Family
TIBKAT | 2022|Keywords: DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME) -
BS: Blockwise Sieve Algorithm for Finding Short Vectors from Sublattices
TIBKAT | 2022|Keywords: DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME) -
TapTree: Process-Tree Based Host Behavior Modeling and Threat Detection Framework via Sequential Pattern Mining
TIBKAT | 2022|Keywords: DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME) -
FN2: Fake News DetectioN Based on Textual and Contextual Features
TIBKAT | 2022|Keywords: DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME) -
Deep Learning Based Webshell Detection Coping with Long Text and Lexical Ambiguity
TIBKAT | 2022|Keywords: DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME) -
Secure Boolean Masking of Gimli: Optimization and Evaluation on the Cortex-M4
TIBKAT | 2022|Keywords: DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME) -
Lightweight and Practical Privacy-Preserving Image Masking in Smart Community
TIBKAT | 2022|Keywords: DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME) -
FRACTAL: Single-Channel Multi-factor Transaction Authentication Through a Compromised Terminal
TIBKAT | 2022|Keywords: DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME) -
Information and communications security : 24th International Conference, ICICS 2022, Canterbury, UK, September 5-8, 2022, proceedings
TIBKAT | 2022|Keywords: DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME) -
On Quantum Ciphertext Indistinguishability, Recoverability, and OAEP
TIBKAT | 2022|Keywords: DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME) -
How to Backdoor (Classic) McEliece and How to Guard Against Backdoors
TIBKAT | 2022|Keywords: DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME) -
Post-Quantum Signal Key Agreement from SIDH
TIBKAT | 2022|Keywords: DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME) -
2F - A New Method for Constructing Efficient Multivariate Encryption Schemes
TIBKAT | 2022|Keywords: DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME) -
A Study of Error Floor Behavior in QC-MDPC Codes
TIBKAT | 2022|Keywords: DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME) -
Estimating the Hidden Overheads in the BDGL Lattice Sieving Algorithm
TIBKAT | 2022|Keywords: DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME) -
Post-quantum Plaintext-Awareness
TIBKAT | 2022|Keywords: DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME) -
Study on the Effect of Face Masks on Forensic Speaker Recognition
TIBKAT | 2022|Keywords: DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME) -
FuzzBoost: Reinforcement Compiler Fuzzing
TIBKAT | 2022|Keywords: DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME) -
Improving Deep Learning Based Password Guessing Models Using Pre-processing
TIBKAT | 2022|Keywords: DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME) -
TZ-IMA: Supporting Integrity Measurement for Applications with ARM TrustZone
TIBKAT | 2022|Keywords: DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME) -
Autoencoder Assist: An Efficient Profiling Attack on High-Dimensional Datasets
TIBKAT | 2022|Keywords: DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME) -
SimCGE: Simple Contrastive Learning of Graph Embeddings for Cross-Version Binary Code Similarity Detection
TIBKAT | 2022|Keywords: DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME) -
Repetitive, Oblivious, and Unlinkable SkNN Over Encrypted-and-Updated Data on Cloud
TIBKAT | 2022|Keywords: DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME) -
Secure Sketch and Fuzzy Extractor with Imperfect Randomness: An Information-Theoretic Study
TIBKAT | 2022|Keywords: DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME) -
A Note on the Security Framework of Two-key DbHtS MACs
TIBKAT | 2022|Keywords: DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME) -
Peekaboo: Hide and Seek with Malware Through Lightweight Multi-feature Based Lenient Hybrid Approach
TIBKAT | 2022|Keywords: DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME) -
Malware Detection with Limited Supervised Information via Contrastive Learning on API Call Sequences
TIBKAT | 2022|Keywords: DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME) -
DeepC2: AI-Powered Covert Command and Control on OSNS
TIBKAT | 2022|Keywords: DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME) -
ODDITY: An Ensemble Framework Leverages Contrastive Representation Learning for Superior Anomaly Detection
TIBKAT | 2022|Keywords: DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME) -
Fast Fourier Orthogonalization over NTRU Lattices
TIBKAT | 2022|Keywords: DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME) -
Maliciously Secure Multi-party PSI with Lower Bandwidth and Faster Computation
TIBKAT | 2022|Keywords: DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME) -
Dependency-Based Link Prediction for Learning Microsegmentation Policy
TIBKAT | 2022|Keywords: DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME) -
Privacy-Aware Split Learning Based Energy Theft Detection for Smart Grids
TIBKAT | 2022|Keywords: DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME) -
Exploring Phone-Based Authentication Vulnerabilities in Single Sign-On System
TIBKAT | 2022|Keywords: DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME)
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions:
full data search
or
title and abstract search
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
TIB AV portal
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
Specialised Information Service for Mobility and Transport Research (FID move)
Open Research Knowledge Graph (ORKG)
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Common Union Catalogue (GVK)
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.