Year of publication
Subject
Type of material
Licence
TIB reading rooms collection
LUH institutes collection
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Practical Covertly Secure MPC for Dishonest Majority - Or: Breaking the SPDZ Limits
Tema Archive | 2013|Keywords: Sicherheit, aktive Sicherheit, beweisbare Sicherheit -
Enabling security functions with SDN: A feasibility study
Elsevier | 2015|Keywords: Network security, Software-defined networking security, SDN security -
The prospects of easier security for small organisations and consumers
Elsevier | 2015|Keywords: Data security, Information security, Baseline security, Security profile -
Apparatus: A framework for security analysis in internet of things systems
Elsevier | 2018|Keywords: IoT Security, Security requirements, Smart cities security -
Exporting decentred security governance: the tensions of security sector reform
Taylor & Francis Verlag | 2016|Keywords: security sector reform, security governance, security/development -
Denial of service attack detection through machine learning for the IoT
Free accessTaylor & Francis Verlag | 2020|Keywords: security, network security -
Climate and security: evidence, emerging risks, and a new agenda
Online Contents | 2014|Keywords: National Security, Security Dimension, Human Security -
The Security of Multiple Encryption in the Ideal Cipher Model
Tema Archive | 2014|Keywords: Sicherheit, beweisbare Sicherheit -
Impact of static and dynamic load models on security margin estimation methods
Elsevier | 2021|Keywords: Dynamic security margins, Dynamic security limits, Security assessment, Security margin estimation -
Security and Privacy Service Level Agreement composition for Internet of Things systems on top of standard controls
Elsevier | 2022|Keywords: Cloud security, IoT security, Security and privacy, Security SLA -
Planning for climate change: the security community’s precautionary principle
Online Contents | 2009|Keywords: National Security, Security Actor, Security Council, Security Institution, Security Community -
Novel security models, metrics and security assessment for maritime vessel networks
Elsevier | 2021|Keywords: Security analysis, Security metrics, Security models -
A survey on registration hijacking attack consequences and protection for session initiation protocol (SIP)
Elsevier | 2020|Keywords: Network security, Sip security -
The fast image encryption algorithm based on lifting scheme and chaos
Elsevier | 2020|Keywords: Information security, Security analysis -
Model-based evaluation of combinations of Shuffle and Diversity MTD techniques on the cloud
Elsevier | 2019|Keywords: Security analysis, Security metrics, Security modeling -
On the design of secure primitives for real world applications
Elsevier | 2020|Keywords: Hardware security, Systems security, Security engineering, Computers and networks security -
Physical unclonable functions based secret keys scheme for securing big data infrastructure communication
Elsevier | 2019|Keywords: IoT Security, Zigbee security, Hardware security -
A framework and tool for the assessment of information security risk, the reduction of information security cost and the sustainability of information security culture
Online Contents | 2021|Keywords: Information security, Information security evaluation, The ARCS security framework, Information security culture, Information security assessment, Information security cost -
The national security field under conditions of armed aggression of the Russian Federation against Ukraine in 2022
Free accessDOAJ | 2022|Keywords: security, security space, international (global) security, national security, military security, information security -
Cloud Infrastructure Security
Wiley | 2019|Keywords: Infrastructure security, Information security, Hypervisor Security, Virtualization Security -
Critiquing the regulation of private security in the United Kingdom: views from inside the sector
Taylor & Francis Verlag | 2017|Keywords: Governance of security, security regulation, security sector, security managers -
European Foreign and Security Policy : States. Power, Institutions
GWLB - Gottfried Wilhelm Leibniz Bibliothek | 2010|Keywords: National security, National security. -
OSCAR: Object security architecture for the Internet of Things
Elsevier | 2014|Keywords: Communication security, Object security, End-to-end security -
Government regulations in cyber security: Framework, standards and recommendations
Elsevier | 2018|Keywords: Cyber security, Information security -
Climate and security: evidence, emerging risks, and a new agenda
Online Contents | 2014|Keywords: National Security, Security Dimension, Human Security -
All-Or-Nothing data protection for ubiquitous communication: Challenges and perspectives
Elsevier | 2019|Keywords: Data security, Multimedia security -
Planning for climate change: the security community’s precautionary principle
Online Contents | 2009|Keywords: National Security, Security Actor, Security Council, Security Institution, Security Community -
The legal framework of the OSCE
GWLB - Gottfried Wilhelm Leibniz Bibliothek | 2019|Keywords: National security ; Law and legislation ; Europe, Security, International, Organization for Security and Co-operation in Europe, National security -
Some aspects of internal security policy as an element of the national security strategy of the Republic of Serbia
Free accessDOAJ | 2017|Keywords: security, internal security, national security strategy, national security policy, internal security policy -
Security of Satellite-Terrestrial Communications: Challenges and Potential Solutions
Free accessDOAJ | 2022|Keywords: Security, network security, satellite security, communications security, NTN security -
PROSEC TEST FOR THRIVE PROTECTIVE SECURITY RULES AGAINST THREATS, RISKS AND VULNERABILITIES
Free accessDOAJ | 2023|Keywords: security rules, security responsibilities, information security, security education -
Role of Explainable AI in 6G Security*
Wiley | 2023|Keywords: explainable security, AI security, 6G security, security of XAI -
Das neue EU-Datenschutzrecht – von der Richtlinie zur Verordnung
DeGruyter | 2016|Keywords: Daten und Sicherheit -
Social network security: Issues, challenges, threats, and solutions
Elsevier | 2017|Keywords: Security and privacy, Security threats -
Water security and the pursuit of food, energy, and earth systems resilience
Taylor & Francis Verlag | 2018|Keywords: water security, energy security, food security -
Semantic security against web application attacks
Elsevier | 2013|Keywords: Application security, Semantic security -
A Study on Acceptance Procedure Improvement of Web Application by Outsourcing for Mobile Service
Online Contents | 2016|Keywords: Security architecture, Information security, Security management -
A machine-learning based probabilistic perspective on dynamic security assessment
Elsevier | 2020|Keywords: Security Rules, Dynamic Security Assessment, Probabilistic Security Assessment -
Cyber security in the Smart Grid: Survey and challenges
Elsevier | 2012|Keywords: Cyber security, Security protocols -
The sentinel and the rebel. Multi-choice policing in Burundi and the state-centered approach of security sector reform
Online Contents | 2016|Keywords: Security Actor, Private Security, Security Sector, Security Force -
Network security assessment using a semantic reasoning and graph based approach
Elsevier | 2017|Keywords: Network security, Security ontology -
A dangerous synergy: energy securitization, great power rivalry and strategic stability in the Asian century
Taylor & Francis Verlag | 2013|Keywords: Energy security, Asia-Pacific security, economic security -
Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation
Tema Archive | 2013|Keywords: Sicherheit, beweisbare Sicherheit -
Geopolitical aspects of energy security and environmental security in the Republic of Serbia
Free accessDOAJ | 2020|Keywords: security, energy security, environmental security -
Examining the need for a high level of therapeutic security at a regional forensic mental health service in Aotearoa New Zealand
Taylor & Francis Verlag | 2024|Keywords: therapeutic security, high security, relational security, procedural security, physical security -
MAPE-K/MAPE-SAC: An interaction framework for adaptive systems with security assurance cases
Elsevier | 2020|Keywords: Security assurance cases, Security certification -
Blockchain‐Based Security Solutions for IoT Systems
Wiley | 2018|Keywords: IoT security, security architecture, network security -
Experimental Study to Analyze the Security Performance in Wireless LANs
Online Contents | 2015|Keywords: Security strength, Security protocols, WLAN security -
Systematic survey of advanced metering infrastructure security: Vulnerabilities, attacks, countermeasures, and future vision
Elsevier | 2022|Keywords: Security vulnerability, Security threat, Security attack
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.