Year of publication
Type of media
Source
Subject
Type of material
Licence
Language
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Energy security: Definitions, dimensions and indexes
Elsevier | 2014|Keywords: Energy security, Energy security indicators, Energy security indexes -
Enabling security functions with SDN: A feasibility study
Elsevier | 2015|Keywords: Network security, Software-defined networking security, SDN security -
Region model and application of regional integrated energy system security analysis
Elsevier | 2019|Keywords: Security region, N − 1 security guideline, Security analysis, Security control -
Apparatus: A framework for security analysis in internet of things systems
Elsevier | 2018|Keywords: IoT Security, Security requirements, Smart cities security -
A framework for evaluating Singapore’s energy security
Elsevier | 2015|Keywords: Energy security, Energy security indexes -
Impact of static and dynamic load models on security margin estimation methods
Elsevier | 2021|Keywords: Dynamic security margins, Dynamic security limits, Security assessment, Security margin estimation -
Security and Privacy Service Level Agreement composition for Internet of Things systems on top of standard controls
Elsevier | 2022|Keywords: Cloud security, IoT security, Security and privacy, Security SLA -
A unified framework for cloud security transparency and audit
Elsevier | 2020|Keywords: Security audit, Cloud security transparency, Security requirements -
Novel security models, metrics and security assessment for maritime vessel networks
Elsevier | 2021|Keywords: Security analysis, Security metrics, Security models -
A survey on registration hijacking attack consequences and protection for session initiation protocol (SIP)
Elsevier | 2020|Keywords: Network security, Sip security -
The fast image encryption algorithm based on lifting scheme and chaos
Elsevier | 2020|Keywords: Information security, Security analysis -
On the design of secure primitives for real world applications
Elsevier | 2020|Keywords: Hardware security, Systems security, Security engineering, Computers and networks security -
Physical unclonable functions based secret keys scheme for securing big data infrastructure communication
Elsevier | 2019|Keywords: IoT Security, Zigbee security, Hardware security -
Implementation of cyber security for safety systems of nuclear facilities
Elsevier | 2015|Keywords: Cyber security, Computer security, Cyber security plan, Cyber security implementation -
Model-based evaluation of combinations of Shuffle and Diversity MTD techniques on the cloud
Elsevier | 2019|Keywords: Security analysis, Security metrics, Security modeling -
A framework to evaluate security of supply in the electricity sector
Elsevier | 2017|Keywords: Security of supply, Energy security -
Towards quantification and evaluation of security of Cloud Service Providers
Elsevier | 2017|Keywords: Security quantification, Security evaluation, Cloud Security Services, Security metrics -
OSCAR: Object security architecture for the Internet of Things
Elsevier | 2014|Keywords: Communication security, Object security, End-to-end security -
Government regulations in cyber security: Framework, standards and recommendations
Elsevier | 2018|Keywords: Cyber security, Information security -
Terminology in safety of collaborative robotics
Elsevier | 2019|Keywords: Collaborative robotics safety, Safety definitions, Safety normative requirements -
Information security risks management framework – A step towards mitigating security risks in university network
Elsevier | 2017|Keywords: Security risk, Security threats -
All-Or-Nothing data protection for ubiquitous communication: Challenges and perspectives
Elsevier | 2019|Keywords: Data security, Multimedia security -
A security evaluation of IEC 62351
Elsevier | 2016|Keywords: Cyber security, Cyber security standard -
Social network security: Issues, challenges, threats, and solutions
Elsevier | 2017|Keywords: Security and privacy, Security threats -
Analysis of livelihood security: A case study in the Kali-Khola watershed of Nepal
Elsevier | 2006|Keywords: Livelihood security, Economic security, Ecological security, Social security -
Cyber security attacks to modern vehicular systems
Elsevier | 2017|Keywords: Security, Security attacks -
Cyber security in the Smart Grid: Survey and challenges
Elsevier | 2012|Keywords: Cyber security, Security protocols -
China’s energy security: The perspective of energy users
Elsevier | 2010|Keywords: Energy security, Security of supply -
The case for islands’ energy vulnerability: Electricity supply diversity in 44 global islands
Elsevier | 2019|Keywords: Energy security, Security -
Semantic security against web application attacks
Elsevier | 2013|Keywords: Application security, Semantic security -
A machine-learning based probabilistic perspective on dynamic security assessment
Elsevier | 2020|Keywords: Security Rules, Dynamic Security Assessment, Probabilistic Security Assessment -
Climate protection and China’s energy security: Win–win or tradeoff
Elsevier | 2011|Keywords: Energy security, Energy security evaluation indicator, Energy security index -
Network security assessment using a semantic reasoning and graph based approach
Elsevier | 2017|Keywords: Network security, Security ontology -
MAPE-K/MAPE-SAC: An interaction framework for adaptive systems with security assurance cases
Elsevier | 2020|Keywords: Security assurance cases, Security certification -
Systematic survey of advanced metering infrastructure security: Vulnerabilities, attacks, countermeasures, and future vision
Elsevier | 2022|Keywords: Security vulnerability, Security threat, Security attack -
TARP: Ticket-based address resolution protocol
Elsevier | 2007|Keywords: Network security, ARP security -
Cloud security engineering: Early stages of SDLC
Elsevier | 2016|Keywords: Cloud security, Security vulnerabilities -
A new unified image encryption algorithm based on a lifting transformation and chaos
Elsevier | 2020|Keywords: Information security, Security analysis -
The area-efficient gate level information flow tracking schemes of digital circuit with multi-level security lattice
Elsevier | 2023|Keywords: Hardware security, Security lattice, Security label -
Swarm Intelligence inspired Intrusion Detection Systems — A systematic literature review
Elsevier | 2021|Keywords: Network security, Data security -
Metaverse intrusion detection of wormhole attacks based on a novel statistical mechanism
Elsevier | 2023|Keywords: IoT security, Network security, Mobile cloud security, Security for Metaverse, Virtualization security, Cyber-Physical security -
An architecture to manage security operations for digital service chains
Elsevier | 2020|Keywords: Cyber-security paradigms, Security architectures -
Hardware/software security co-verification and vulnerability detection: An information flow perspective
Elsevier | 2023|Keywords: Hardware and software security co-verification, Information flow security, Security model, Security property -
Towards a trusted HDFS storage platform: Mitigating threats to Hadoop infrastructures using hardware-accelerated encryption with TPM-rooted key protection
Elsevier | 2014|Keywords: HDFS security, Security -
Energy security level assessment technology
Elsevier | 2011|Keywords: Energy security, Security level -
Definitions and dimensions for electricity security assessment: A Review
Elsevier | 2021|Keywords: Electricity security, Energy security -
Model based security verification of Cyber-Physical System based on Petrinet: A case study of Nuclear power plant
Elsevier | 2021|Keywords: Security modeling, Security analysis, Security metrics -
Assessing energy security performance in the Asia Pacific, 1990–2010
Elsevier | 2012|Keywords: Energy security, Security of supply -
Hydrogen storage and delivery: Review of the state of the art technologies and risk and reliability analysis
Elsevier | 2019|Keywords: Hydrogen safety, Safety
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.