Year of publication
Type of media
Source
Type of material
Licence
Language
1–50 of 174,981 hits
Sort by:
Sort by:
-
Correction to: A decentralized honeypot for IoT Protocols based on Android devices
Online Contents | 2022|Keywords: Sicherheit -
A decentralized honeypot for IoT Protocols based on Android devices
Online Contents | 2022|Keywords: Sicherheit -
Gridchain: an investigation of privacy for the future local distribution grid
Free accessOnline Contents | 2022|Keywords: Sicherheit -
Defeating traffic analysis via differential privacy: a case study on streaming traffic
Online Contents | 2022|Keywords: Sicherheit -
Are chrome extensions compliant with the spirit of least privilege?
Free accessOnline Contents | 2022|Keywords: Sicherheit -
Algorithm substitution attacks against receivers
Free accessOnline Contents | 2022|Keywords: Sicherheit -
Malicious code detection in android: the role of sequence characteristics and disassembling methods
Free accessOnline Contents | 2022|Keywords: Sicherheit -
Intrusion detection system over real-time data traffic using machine learning methods with feature selection approaches
Online Contents | 2022|Keywords: Sicherheit -
A review on fake news detection 3T’s: typology, time of detection, taxonomies
Online Contents | 2022|Keywords: Sicherheit -
A first look at references from the dark to the surface web world: a case study in Tor
Online Contents | 2022|Keywords: Sicherheit -
A survey on analyzing encrypted network traffic of mobile devices
Online Contents | 2022|Keywords: Sicherheit -
A systematic overview on methods to protect sensitive data provided for various analyses
Free accessOnline Contents | 2022|Keywords: Sicherheit -
CT-GCN: a phishing identification model for blockchain cryptocurrency transactions
Online Contents | 2022|Keywords: Sicherheit -
A deep learner model for multi-language webshell detection
Online Contents | 2022|Keywords: Sicherheit -
An anonymous and unlinkable electronic toll collection system
Online Contents | 2022|Keywords: Sicherheit -
LASSI: a lightweight authenticated key agreement protocol for fog-enabled IoT deployment
Online Contents | 2022|Keywords: Sicherheit -
Security analysis and improvement of a privacy-preserving authentication scheme in VANET
Online Contents | 2022|Keywords: Sicherheit -
Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains
Free accessOnline Contents | 2022|Keywords: Sicherheit -
A novel approach for detection of APT malware using multi-dimensional hybrid Bayesian belief network
Online Contents | 2022|Keywords: Sicherheit -
Classifying resilience approaches for protecting smart grids against cyber threats
Free accessOnline Contents | 2022|Keywords: Sicherheit -
An efficient intrusion detection system for MQTT-IoT using enhanced chaotic salp swarm algorithm and LightGBM
Online Contents | 2022|Keywords: Sicherheit -
The SAINT observatory subsystem: an open-source intelligence tool for uncovering cybersecurity threats
Online Contents | 2022|Keywords: Sicherheit -
A survey on interest packet flooding attacks and its countermeasures in named data networking
Online Contents | 2022|Keywords: Sicherheit -
Efficient verifiable computation over quotient polynomial rings
Online Contents | 2022|Keywords: Sicherheit -
Highly private blockchain-based management system for digital COVID-19 certificates
Free accessOnline Contents | 2022|Keywords: Sicherheit -
Design and implementation of a new lightweight chaos-based cryptosystem to secure IoT communications
Online Contents | 2022|Keywords: Sicherheit -
MAPAS: a practical deep learning-based android malware detection system
Free accessOnline Contents | 2022|Keywords: Sicherheit -
Challenges of post-quantum digital signing in real-world applications: a survey
Online Contents | 2022|Keywords: Sicherheit -
A systematic literature review on wearable health data publishing under differential privacy
Online Contents | 2022|Keywords: Sicherheit -
A study of machine learning-based models for detection, control, and mitigation of cyberbullying in online social media
Online Contents | 2022|Keywords: Sicherheit -
Deep SARSA-based reinforcement learning approach for anomaly network intrusion detection system
Online Contents | 2022|Keywords: Sicherheit -
Value-utilized taint propagation: toward precise detection of apps’ information flows across Android API calls
Online Contents | 2022|Keywords: Sicherheit -
Early web application attack detection using network traffic analysis
Online Contents | 2022|Keywords: Sicherheit -
A multi-objective cost–benefit optimization algorithm for network hardening
Online Contents | 2022|Keywords: Sicherheit -
A Digital Asset Inheritance Model to Convey Online Persona Posthumously
Online Contents | 2022|Keywords: Sicherheit -
Cyber risk management for autonomous passenger ships using threat-informed defense-in-depth
Free accessOnline Contents | 2022|Keywords: Sicherheit -
Lib2Desc: automatic generation of security-centric Android app descriptions using third-party libraries
Online Contents | 2022|Keywords: Sicherheit -
Developing non-interactive MPC with trusted hardware for enhanced security
Online Contents | 2022|Keywords: Sicherheit -
A security protocol for D2D communications in 5G networks using elliptic curve cryptography
Online Contents | 2022|Keywords: Sicherheit -
PSO + FL = PAASO: particle swarm optimization + federated learning = privacy-aware agent swarm optimization
Free accessOnline Contents | 2022|Keywords: Sicherheit -
Security analysis on “Three-factor authentication protocol using physical unclonable function for IoV”
Online Contents | 2022|Keywords: Sicherheit -
Modeling reporting delays in cyber incidents: an industry-level comparison
Online Contents | 2022|Keywords: Sicherheit -
ThunderSecure: deploying real-time intrusion detection for 100G research networks by leveraging stream-based features and one-class classification network
Online Contents | 2022|Keywords: Sicherheit -
ANS-based compression and encryption with 128-bit security
Free accessOnline Contents | 2022|Keywords: Sicherheit -
DFTMicroagg: a dual-level anonymization algorithm for smart grid data
Free accessOnline Contents | 2022|Keywords: Sicherheit -
IoT-oriented high-efficient anti-malware hardware focusing on time series metadata extractable from inside a processor core
Free accessOnline Contents | 2022|Keywords: Sicherheit
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions:
full data search
or
title and abstract search
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
TIB AV portal
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
Specialised Information Service for Mobility and Transport Research (FID move)
Open Research Knowledge Graph (ORKG)
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Common Union Catalogue (GVK)
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.