Year of publication
Subject
Type of material
Licence
TIB reading rooms collection
LUH institutes collection
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Energy security: Definitions, dimensions and indexes
Elsevier | 2014|Keywords: Energy security, Energy security indicators, Energy security indexes -
Region model and application of regional integrated energy system security analysis
Elsevier | 2019|Keywords: Security region, N − 1 security guideline, Security analysis, Security control -
Übersetzungen - kerntechnische Regeln
TIBKAT | 1974 - 1981,9; damit Ersch. eingest.|Keywords: Sicherheit, Sicherheit, Technische -
A framework for evaluating Singapore’s energy security
Elsevier | 2015|Keywords: Energy security, Energy security indexes -
Impact of static and dynamic load models on security margin estimation methods
Elsevier | 2021|Keywords: Dynamic security margins, Dynamic security limits, Security assessment, Security margin estimation -
Climate and security: evidence, emerging risks, and a new agenda
Online Contents | 2014|Keywords: National Security, Security Dimension, Human Security -
Design Considerations for Building Credible Security Testbeds: Perspectives from Industrial Control System Use Cases
Taylor & Francis Verlag | 2021|Keywords: security simulations, security modelling, cyber security simulations -
Challenges and performance metrics for security operations center analysts: a systematic review
Taylor & Francis Verlag | 2020|Keywords: Security operations center, cyber security, security analysts -
Planning for climate change: the security community’s precautionary principle
Online Contents | 2009|Keywords: National Security, Security Actor, Security Council, Security Institution, Security Community -
Bayesian Stackelberg games for cyber-security decision support
Elsevier | 2021|Keywords: Cyber-security, Security games, Security investment -
On the design of secure primitives for real world applications
Elsevier | 2020|Keywords: Hardware security, Systems security, Security engineering, Computers and networks security -
Implementation of cyber security for safety systems of nuclear facilities
Elsevier | 2015|Keywords: Cyber security, Computer security, Cyber security plan, Cyber security implementation -
The national security field under conditions of armed aggression of the Russian Federation against Ukraine in 2022
Free accessDOAJ | 2022|Keywords: security, security space, international (global) security, national security, military security, information security -
Securing state reconstruction under sensor and actuator attacks: Theory and design
Elsevier | 2020|Keywords: Cyber–physical security, Security monitoring -
Digital transformation and challenges to data security and privacy
TIBKAT | 2021|Keywords: Database security, Computer security -
A framework to evaluate security of supply in the electricity sector
Elsevier | 2017|Keywords: Security of supply, Energy security -
Decision support for selecting information security controls
Taylor & Francis Verlag | 2018|Keywords: Information security, security controls, optimisation of security portfolio -
Teachers' and students' attitudes towards information security: A qualitative study
Wiley | 2020|Keywords: information security, information security behavior, information security motivation, information security tools -
A parallel image encryption algorithm based on the piecewise linear chaotic map and hyper-chaotic map
Online Contents | 2018|Keywords: Image security, Security analysis -
The Perspective of Safety Engineers on Safety Climate
Wiley | 2015|Keywords: Safety Engineers, Safety Compliance, Safety Motivation, Safety Participation, Safety Knowledge, Organizational Safety Climate -
A parallel image encryption algorithm based on the piecewise linear chaotic map and hyper-chaotic map
Online Contents | 2018|Keywords: Image security, Security analysis -
CAAVI-RICS model for observing the security of distributed IoT and edge computing systems
Elsevier | 2020|Keywords: Cyber-security, Distributed security -
Terminology in safety of collaborative robotics
Elsevier | 2019|Keywords: Collaborative robotics safety, Safety definitions, Safety normative requirements -
Information security management in SOCs and SICs
IOS Press | 2018|Keywords: Information security, information security management, Security Operations Center, Security Intelligence Center, information security incident -
Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
Elsevier | 2009|Keywords: Information security, End-user security behaviors, Security policy compliance -
Climate and security: evidence, emerging risks, and a new agenda
Online Contents | 2014|Keywords: National Security, Security Dimension, Human Security -
Security versus convenience? An experimental study of user misperceptions of wireless internet service quality
Elsevier | 2011|Keywords: Information security, Security/convenience tradeoff, Security engineering -
Planning for climate change: the security community’s precautionary principle
Online Contents | 2009|Keywords: National Security, Security Actor, Security Council, Security Institution, Security Community -
Scientific and Methodological Approach to Assessing the Level of Banks’ Financial Security
Springer Verlag | 2020|Keywords: Financial security, Financial security components, Security of deposit transactions, Security of credit transactions, Security of cash transactions, Security of investment transactions, Security of currency transactions, A financial security indicator, Level of financial security -
Berichte über die vom Bundesministerium für Bildung und Wissenschaft geförderten Forschungsvorhaben auf dem Gebiet der Reaktorsicherheit
TIBKAT | Nachgewiesen 1971,Juli/Sept.(1972) - 1972,Juli/Sept.|Keywords: Sicherheit, Sicherheit, Technische -
Water security and the pursuit of food, energy, and earth systems resilience
Taylor & Francis Verlag | 2018|Keywords: water security, energy security, food security -
Retrospective Analysis of the Main Indicators of Ukraine's Financial Security
Free accessDOAJ | 2019|Keywords: security, financial security, financial security indicators, bank security, monetary security -
China’s energy security: The perspective of energy users
Elsevier | 2010|Keywords: Energy security, Security of supply -
The case for islands’ energy vulnerability: Electricity supply diversity in 44 global islands
Elsevier | 2019|Keywords: Energy security, Security -
Machine learning-enhanced hybrid cryptography and image steganography algorithm for securing cloud data
IOS Press | 2024|Keywords: Data security, security -
The BPSec Security Mechanism
Wiley | 2023|Keywords: BPSec Security Mechanism, Security Operations, Security Contexts, Security Blocks, Other Security Blocks -
Climate protection and China’s energy security: Win–win or tradeoff
Elsevier | 2011|Keywords: Energy security, Energy security evaluation indicator, Energy security index -
Not all areas are equal: analysis of citations in information security research
Online Contents | 2019|Keywords: Information security, Science of security, Cyber security -
A dangerous synergy: energy securitization, great power rivalry and strategic stability in the Asian century
Taylor & Francis Verlag | 2013|Keywords: Energy security, Asia-Pacific security, economic security -
Stackelberg game modeling of cloud security defending strategy in the case of information leaks and corruption
Elsevier | 2020|Keywords: Cloud security, Security threat modeling -
An architecture to manage security operations for digital service chains
Free accessBASE | 2021|Keywords: Cyber-security paradigm, Security architecture -
The Design of the Enterprise Network Security Solutions
National licenceTrans Tech Publications | 2014|Keywords: Security, Network Security, Windows Security -
A framework for secure IT operations in an uncertain and changing environment
Elsevier | 2017|Keywords: Information security, IT security management, Security investment decisions -
Cyber breach response that actually works : organizational approach to managing residual risk
TIBKAT | 2020|Keywords: Computer security ; Management, Computer security -
CARMEN: A framework for the verification and diagnosis of the specification of security requirements in cyber-physical systems
Elsevier | 2021|Keywords: Security, Security requirements, Security verification -
Automating Security Risk and Requirements Management for Cyber-Physical Systems
Free accessBASE | 2020|Keywords: Security risk management, Machine-readable security requirements, Risk-driven security, Security engineering, Security requirements, Security risk assessment, Security risk mitigation, Security risk monitoring, Automotive security, CPS security, IIoT security, OT security -
Immersive technology-driven investigations on influence factors of cognitive load incurred in construction site hazard recognition, analysis and decision making
Elsevier | 2021|Keywords: Construction safety, Safety hazard, Safety education -
An architecture to manage security operations for digital service chains
Free accessBASE | 2020|Keywords: cyber-security paradigms, security architectures -
Continuous fields: Enhanced in-vehicle anomaly detection using machine learning models
Elsevier | 2020|Keywords: Controller area network security, Automotive security, Security monitoring
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.