Year of publication
Type of media
Source
Subject
Type of material
Licence
Language
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
The information systems' security level assessment model based on an ontology and evidential reasoning approach
Elsevier | 2015|Keywords: Information security model, Information security, Security control selection, Security management -
Information Security Behaviour Profiling Framework (ISBPF) for student mobile phone users
Elsevier | 2015|Keywords: Information security awareness, Mobile security behaviour, Information security behavioural intent -
Continuous software security through security prioritisation meetings
Elsevier | 2022|Keywords: Software security, Security meeting, Security prioritisation, Security requirements -
Security in product lifecycle of IoT devices: A survey
Elsevier | 2020|Keywords: Security solutions, Product lifecycle security, Device security -
Information security management standards: Problems and solutions
Elsevier | 2008|Keywords: Information systems security, Information security management standards, Information security management, Information security management guidelines, Information security certification -
Influencing the security prioritisation of an agile software development project
Elsevier | 2022|Keywords: Software security, Security priority, Security requirements -
Cybersecurity compliance behavior: Exploring the influences of individual decision style and other antecedents
Elsevier | 2019|Keywords: General security awareness, General security orientation, Security self-efficacy -
Security of vehicular ad-hoc networks: A comprehensive survey
Elsevier | 2019|Keywords: Security attacks, Security mechanisms -
Model-based specification of safety compliance needs for critical systems: A holistic generic metamodel
Elsevier | 2015|Keywords: Safety-critical system, Safety standard, Safety compliance, Safety assurance, Safety certification -
Persona-centred information security awareness
Elsevier | 2017|Keywords: Information security, Security awareness -
Lattice based access control for protecting user data in cloud environments with hybrid security
Elsevier | 2020|Keywords: Cloud security, Lattice based security, Storage security -
Toward a stage theory of the development of employees’ information security behavior
Elsevier | 2020|Keywords: Information security, Information security behavior, Compliance with information security policies -
A framework for automating security analysis of the internet of things
Elsevier | 2017|Keywords: Security analysis, Security modeling -
Towards quantification and evaluation of security of Cloud Service Providers
Elsevier | 2017|Keywords: Security quantification, Security evaluation, Cloud Security Services, Security metrics -
Information security management: An information security retrieval and awareness model for industry
Elsevier | 2008|Keywords: Information security, Information security awareness, Information security management, Information security risk, Information security threats, Information security vulnerabilities -
OSCAR: Object security architecture for the Internet of Things
Elsevier | 2014|Keywords: Communication security, Object security, End-to-end security -
A neo-institutional perspective on the establishment of information security knowledge sharing practices
Elsevier | 2021|Keywords: Information security knowledge sharing establishment, Security compliance, Security culture -
CIMA: Compiler-Enforced Resilience Against Memory Safety Attacks in Cyber-Physical Systems
Elsevier | 2020|Keywords: Cyber-physical systems security, CPS security, Memory-safety attacks, Software security, Critical infrastructures security -
A secure and lightweight authentication scheme for next generation IoT infrastructure
Elsevier | 2020|Keywords: 6G/IoT security, Network Security -
Government regulations in cyber security: Framework, standards and recommendations
Elsevier | 2018|Keywords: Cyber security, Information security -
CAAVI-RICS model for observing the security of distributed IoT and edge computing systems
Elsevier | 2020|Keywords: Cyber-security, Distributed security -
Enhancing End-User Roles in Information Security: Exploring the Setting, Situation, and Identity
Elsevier | 2021|Keywords: Information security behaviors, Security policy, Security threats -
Securing business processes using security risk-oriented patterns
Elsevier | 2013|Keywords: Security engineering, Security risk-oriented patterns, Security requirements -
Can individuals’ neutralization techniques be overcome? A field experiment on password policy
Elsevier | 2019|Keywords: Information security policy, Information security -
Decisions making in information security outsourcing: Impact of complementary and substitutable firms
Elsevier | 2017|Keywords: Managed security service providers, Information security investment, Information security outsourcing -
Evaluating the effectiveness of shuffle and redundancy MTD techniques in the cloud
Elsevier | 2020|Keywords: Security analysis, Graphical security models, Security metrics -
Information security risks management framework – A step towards mitigating security risks in university network
Elsevier | 2017|Keywords: Security risk, Security threats -
All-Or-Nothing data protection for ubiquitous communication: Challenges and perspectives
Elsevier | 2019|Keywords: Data security, Multimedia security -
Exploring attack graph for cost-benefit security hardening: A probabilistic approach
Elsevier | 2012|Keywords: Security management, Security hardening, Security metrics -
Security as a theoretical attribute construct
Elsevier | 2013|Keywords: Security, Information security, Cyber security, Mobile security -
A survey on energy-aware security mechanisms
Elsevier | 2015|Keywords: Security, Energy-aware security -
Explaining the interactions of humans and artifacts in insider security behaviors: The mangle of practice perspective
Elsevier | 2020|Keywords: Information systems security, Information security behaviors, Information security artifacts, Security controls -
A comprehensive security assessment framework for software-defined networks
Elsevier | 2020|Keywords: Security, Network security -
A security evaluation of IEC 62351
Elsevier | 2016|Keywords: Cyber security, Cyber security standard -
Social network security: Issues, challenges, threats, and solutions
Elsevier | 2017|Keywords: Security and privacy, Security threats -
A quantitative security evaluation and analysis model for web applications based on OWASP application security verification standard
Elsevier | 2023|Keywords: Web application security, Security evaluation, Security analysis -
Information sharing vs. privacy: A game theoretic analysis
Elsevier | 2017|Keywords: Information security economics, Security knowledge growth, Security investment -
Cyber security attacks to modern vehicular systems
Elsevier | 2017|Keywords: Security, Security attacks -
Analyzing the role of cognitive and cultural biases in the internalization of information security policies: Recommendations for information security awareness programs
Elsevier | 2015|Keywords: Information security awareness, Security policy compliance, Security behavior -
3-Dimensional Secured Fingerprint Shell
Elsevier | 2018|Keywords: Biometric security, Template security -
Cyber security in the Smart Grid: Survey and challenges
Elsevier | 2012|Keywords: Cyber security, Security protocols -
A bio-signal based framework to secure mobile devices
Elsevier | 2017|Keywords: Security of mobile devices, Security -
Lightweight collaborative anomaly detection for the IoT using blockchain
Elsevier | 2020|Keywords: IoT security, Collaborative security -
Pair-polar coordinate-based cancelable fingerprint templates
Elsevier | 2011|Keywords: Biometrics security, Fingerprint security -
The Z-Wave routing protocol and its security implications
Elsevier | 2017|Keywords: Network security, Home automation security, Embedded systems security -
Semantic security against web application attacks
Elsevier | 2013|Keywords: Application security, Semantic security -
Security solution frames and security patterns for authorization in distributed, collaborative systems
Elsevier | 2015|Keywords: Security engineering, Security patterns, Distributed systems security, Security solution frames -
Shared RFID ownership transfer protocols
Elsevier | 2015|Keywords: RFID security, Security protocol -
Security practitioners in context: Their activities and interactions with other stakeholders within organizations
Elsevier | 2009|Keywords: Security tools, Usable security, Security practitioners -
Modeling continuous security: A conceptual model for automated DevSecOps using open-source software over cloud (ADOC)
Elsevier | 2020|Keywords: Continuous security, Open-source software security, Cloud security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.