Year of publication
Subject
Type of material
Licence
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Denial of service attack detection through machine learning for the IoT
Free accessTaylor & Francis Verlag | 2020|Keywords: security, network security -
Security Requirements and Challenges of 6G Technologies and Applications
Free accessDOAJ | 2022|Keywords: 6G security, security architecture, security threats, physical layer security -
Effect of safety climate on safety behavior in employees: The mediation of safety motivation
Free accessBASE | 2019|Keywords: safety behavior, safety climate, safety motivation -
Impact of Construction Safety Culture and Construction Safety Climate on Safety Behavior and Safety Motivation
Free accessDOAJ | 2021|Keywords: construction safety culture, construction safety climate, construction safety, safety behavior, safety motivation, Industrial safety. Industrial accident prevention -
An Effective Security Requirements Engineering Framework for Cyber-Physical Systems
Free accessDOAJ | 2018|Keywords: security requirements, security requirements engineering, security goal -
The Impact of Artificial Intelligence on Data System Security: A Literature Review
Free accessDOAJ | 2021|Keywords: security, security of data, security systems -
Some aspects of internal security policy as an element of the national security strategy of the Republic of Serbia
Free accessDOAJ | 2017|Keywords: security, internal security, national security strategy, national security policy, internal security policy -
PROSEC TEST FOR THRIVE PROTECTIVE SECURITY RULES AGAINST THREATS, RISKS AND VULNERABILITIES
Free accessDOAJ | 2023|Keywords: security rules, security responsibilities, information security, security education -
Effect of safety climate on safety behavior in employees: The mediation of safety motivation
Free accessBASE | 2019|Keywords: safety behavior, safety climate, safety motivation -
Security of Satellite-Terrestrial Communications: Challenges and Potential Solutions
Free accessDOAJ | 2022|Keywords: Security, network security, satellite security, communications security, NTN security -
Physical Unclonable Functions in the Internet of Things: State of the Art and Open Challenges
Free accessDOAJ | 2019|Keywords: security, hardware security -
Analysis of the impact of military organization's safety culture on safety behavior
Free accessDOAJ | 2020|Keywords: safety culture, safety climate, safety leadership, safety knowledge, safety communication, safety behavior -
Improving Android app security and privacy with developers
Free accessBASE | 2020|Keywords: Android security, developer-centric security, mobile security -
Geopolitical aspects of energy security and environmental security in the Republic of Serbia
Free accessDOAJ | 2020|Keywords: security, energy security, environmental security -
Discrimination between Replay Attacks and Sensor Faults for Cyber-Physical Systems via Event-Triggered Communication
Free accessBASE | 2021|Keywords: Cyber-security -
Health security of Poles
Free accessDOAJ | 2020|Keywords: health security, social security, national security -
Remote warfare – Buzzword or Buzzkill?
Free accessTaylor & Francis Verlag | 2021|Keywords: security studies, international security -
Towards a Safer Internet of Things—A Survey of IoT Vulnerability Data Sources
Free accessDOAJ | 2020|Keywords: network security, computer security, data security -
A contribution to definition of the concept of security in legal theory
Free accessDOAJ | 2014|Keywords: security, security bodies, individual security, international security, global security -
Some aspects of security culture in information technologies
Free accessDOAJ | 2023|Keywords: security, security culture, security culture in information technologies, information security culture -
SlowITe, a Novel Denial of Service Attack Affecting MQTT
Free accessDOAJ | 2020|Keywords: protocols security, cyber-security, network security -
“The security environment has always been complex!”: the views of Finnish military officers on complexity
Free accessTaylor & Francis Verlag | 2020|Keywords: security, comprehensive security -
The technological challenge for current generation nuclear reactors
Free accessBASE | 2019|Keywords: Nuclear reactor safety, extended safety margins, additional safety barrier -
Advanced Security System using PIC through Bluetooth
Free accessBASE | 2018|Keywords: Computer Security, Security -
Interpolarity. Re-visiting security and the global order
Free accessTaylor & Francis Verlag | 2022|Keywords: security governance, European security -
Designing a map for measuring and managing safety performance
Free accessTaylor & Francis Verlag | 2023|Keywords: occupational health and safety, safety management, safety leadership, safety performance -
Designing Impactful Construction Safety Training Interventions
Free accessDOAJ | 2021|Keywords: construction safety, safety training, safety intervention, occupational safety and health, safety management, Industrial safety. Industrial accident prevention -
Analysis of the physical layer security enhancing of wireless communication system under the random mobile
Free accessIET | 2019|Keywords: system security, physical layer security research, random mobile user physical layer security model, security of data, telecommunication security, artificial noise security scheme, physical layer security performance, physical layer security enhancing -
Security analysis and protection system construction in 5G networks
Free accessDOAJ | 2021|Keywords: network security, security protection, security architecture -
Does safety climate make sense in hospitals of a developing country?
Free accessBASE | 2021|Keywords: Patient’s safety, Safety climate, Safety culture -
When Agile Security Meets 5G
Free accessDOAJ | 2020|Keywords: 5G security, agile security, cloud security, security risk management -
Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography
Free accessDOAJ | 2019|Keywords: iot security, rfid security -
Analysis of the physical layer security enhancing of wireless communication system under the random mobile
Free accessWiley | 2019|Keywords: physical layer security research, artificial noise security scheme, physical layer security performance, security of data, system security, random mobile user physical layer security model, telecommunication security, physical layer security enhancing -
Development of directions for improving the monitoring of the state economic security under conditions of global instability
Free accessDOAJ | 2023|Keywords: economic security, national security, ensuring economic security, security -
Survey on Prominent RFID Authentication Protocols for Passive Tags
Free accessDOAJ | 2018|Keywords: security, security threats, security attacks -
The safety culture stack – the next evolution of safety culture?
Free accessTaylor & Francis Verlag | 2018|Keywords: Safety culture, operational safety -
Still agreeing to disagree: international security and constructive ambiguity
Free accessTaylor & Francis Verlag | 2021|Keywords: UN Security Council resolutions, security -
Simulation-Based Cybersecurity Testing and Evaluation Method for Connected Car V2X Application Using Virtual Machine
Free accessDOAJ | 2023|Keywords: connected car security, V2X security, security evaluation scenario -
ASM: Augmented Security Module for Commercial IoT Devices
Free accessDOAJ | 2024|Keywords: augmented security module, IoT security, security framework, security service -
CLOUD SECURITY AND COMPLIANCE - A SEMANTIC APPROACH IN END TO END SECURITY
Free accessDOAJ | 2017|Keywords: cloud security, Security compliance models, Cloud security models. -
Multimodal layer surveillance map based on anomaly detection using multi‐agents for smart city security
Free accessWiley | 2022|Keywords: smart‐city security, security robot -
Continuous Quantitative Risk Management in Smart Grids Using Attack Defense Trees
Free accessDOAJ | 2020|Keywords: information security, security management -
PSAM 14 - Probabilistic Safety Assessment and Management : 16-21 September 2018, UCLA Meyer & Renee Luskin Conference Center, Los Angeles, CA
Free accessTIBKAT | 2018|Keywords: Sicherheit -
Provide a Model for Improving Work Safety Value Using Fuzzy Performance Indicators: A Case Study of Small Scale Power Plant
Free accessBASE | 2022|Keywords: safety, Safety Value, Cost of Safety -
Heating of hip joint implants in MRI: The combined effect of RF and switched‐gradient fields
Free accessBASE | 2021|Keywords: MRI Safety -
Does Energy Demand Security Affect International Competitiveness? Case of Selected Energy-Exporting OECD Countries
Free accessDOAJ | 2022|Keywords: energy security, exporter’s energy security, demand security -
AutoSecSDNDemo: Demonstration of automated end-to-end security in software-defined networks
Free accessFraunhofer Publica | 2016|Keywords: SDN security, end-to-end security, network security -
Automatically Attributing Mobile Threat Actors by Vectorized ATT&CK Matrix and Paired Indicator
Free accessDOAJ | 2021|Keywords: mobile security, cyber security -
SECURITY EDUCATION IN AFRICA: PATTERNS AND PROSPECTS
Free accessDOAJ | 2015|Keywords: Security education, Collaborative pursuit of security, Security challenges, Command structure of security forces, Uniformed security forces, National security, Governing national security, Military and national security, Security leaders, National security leaders -
Fraud detection through data sharing using privacy‐preserving record linkage, digital signature (EdDSA), and the MinHash technique: Detect fraud using privacy preserving record links
Free accessWiley | 2023|Keywords: information security, network security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.