Year of publication
Type of media
Source
Subject
Type of material
Licence
Language
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Efficient compressed sensing-based security approach for video surveillance application in wireless multimedia sensor networks
Elsevier | 2017|Keywords: Security, Security keys -
Power-aware anomaly detection in smartphones: An analysis of on-platform versus externalized operation
Elsevier | 2014|Keywords: Smartphone security, Outsourced security -
A sentence-level text adversarial attack algorithm against IIoT based smart grid
Elsevier | 2021|Keywords: IIoT security, Smart grid security -
Validation of a socio-technical management process for optimising cybersecurity practices
Elsevier | 2020|Keywords: Information security, Systems security -
Security challenges with network functions virtualization
Elsevier | 2016|Keywords: Network security, Security threats -
Information security governance challenges and critical success factors: Systematic review
Elsevier | 2020|Keywords: Information security governance ISG, Security culture, Information security management system ISMS -
Passive- and not active-risk tendencies predict cyber security behavior
Elsevier | 2020|Keywords: Cyber security, Security -
A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks
Elsevier | 2015|Keywords: Security Attacks -
On usage control for GRID systems
Elsevier | 2009|Keywords: Security policies, Grid security, Distributed systems security -
Probabilistic yoking proofs for large scale IoT systems
Elsevier | 2015|Keywords: RFID security, IoT security -
Information assurance techniques: Perceived cost effectiveness
Elsevier | 2016|Keywords: Security, Security assessment -
A survey of CAPTCHA technologies to distinguish between human and computer
Elsevier | 2019|Keywords: Security -
A dynamic prime number based efficient security mechanism for big sensing data streams
Elsevier | 2016|Keywords: Security, Security verification -
Applying network analysis to investigate interpersonal influence of information security behaviours in the workplace
Elsevier | 2016|Keywords: Security compliance, Security behaviour, Security management -
Cloud security: Emerging threats and current solutions
Elsevier | 2016|Keywords: Cloud computing security, Security techniques -
Simulation of transaction malleability attack for blockchain-based e-Voting
Elsevier | 2020|Keywords: Blockchain Security, Security Evaluation -
Security modelling and assessment of modern networks using time independent Graphical Security Models
Elsevier | 2019|Keywords: Graphical security models, Security metrics, Security assessment -
Security-oriented view of app behaviour using textual descriptions and user-granted permission requests
Elsevier | 2019|Keywords: Mobile security, Android security -
Managing partial outsourcing on information security in the presence of security externality
Elsevier | 2023|Keywords: Information security strategy, Security externality, Managed security service -
Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers
Elsevier | 2013|Keywords: Physical layer security, Hardware security -
An aspect-oriented approach for the systematic security hardening of code
Elsevier | 2008|Keywords: Security hardening, Security hardening patterns, Security hardening plans, Computer security, Security patterns -
Can financial incentives help with the struggle for security policy compliance?
Elsevier | 2021|Keywords: Security incentives, Security policy compliance -
Ontology-driven evolution of software security
Elsevier | 2021|Keywords: Model-based security, Security context knowledge, Security compliance -
An improved smart card based password authentication scheme with provable security
Elsevier | 2008|Keywords: Network security, Provable security -
Theorem proof based gate level information flow tracking for hardware security verification
Elsevier | 2019|Keywords: Hardware security, Security vulnerability, Security verification -
Dual-use open source security software in organizations – Dilemma: Help or hinder?
Elsevier | 2013|Keywords: Open source security tools, Information security, Organizational security -
PARTH: A two-stage lightweight mutual authentication protocol for UAV surveillance networks
Elsevier | 2020|Keywords: Physical security, Security protocol -
An empirical study on security expert ecosystem in the future IoT service environment
Elsevier | 2016|Keywords: Security ecosystem, Security expert -
A survey of security issues for cloud computing
Elsevier | 2016|Keywords: Cloud security, Security threats -
Performance evaluation of the SRE and SBPG components of the IoT hardware platform security advisor framework
Elsevier | 2021|Keywords: IoT security, Security framework, IoT security requirements, IoT security best practices -
A security pattern detection framework for building more secure software
Elsevier | 2020|Keywords: Security patterns, Security pattern detection technique, Security quality assurance -
Applying social marketing to evaluate current security education training and awareness programs in organisations
Elsevier | 2020|Keywords: Information security education training and awareness, Behavioural information security, Security interventions -
The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches
Elsevier | 2021|Keywords: Software security, Computer security -
A case analysis of information systems and security incident responses
Elsevier | 2015|Keywords: Information Security Management, Security learning -
Quantitatively assessing the vulnerability of critical information systems: A new method for evaluating security enhancements
Elsevier | 2008|Keywords: Information security, Information-security measurement, Security threats -
Predicting employee information security policy compliance on a daily basis: The interplay of security-related stress, emotions, and neutralization
Elsevier | 2019|Keywords: Information security policy (ISP), Security compliance, Security-related stress -
Understanding and overcoming cyber security anti-patterns
Elsevier | 2012|Keywords: Cyber security, Security controls, Security governance -
The mediating role of security anxiety in internet threat avoidance behavior
Elsevier | 2023|Keywords: Information security, Internet security, Security anxiety -
A Bayesian network model for likelihood estimations of acquirement of critical software vulnerabilities and exploits
Elsevier | 2014|Keywords: Cyber security, Security metrics -
Integrating information quality dimensions into information security risk management (ISRM)
Elsevier | 2017|Keywords: Information security, Information Security Risk Management -
Experimental comparison of attack trees and misuse cases for security threat identification
Elsevier | 2008|Keywords: Security requirements, Security modelling, Security threat identification -
Two-factor authentication time: How time-efficiency and time-satisfaction are associated with perceived security and satisfaction
Elsevier | 2023|Keywords: Security, Usable security -
Scalable RFID security framework and protocol supporting Internet of Things
Elsevier | 2014|Keywords: Security protocol, Security framework -
SecLooCI: A comprehensive security middleware architecture for shared wireless sensor networks
Elsevier | 2014|Keywords: Security middleware, Security -
Utilizing safety rule correlation for mobile scaffolds monitoring leveraging deep convolution neural networks
Elsevier | 2021|Keywords: Safety rule compliance, Safety risk correlation pattern, Safety monitoring -
Out of fear or desire? Toward a better understanding of employees’ motivation to follow IS security policies
Elsevier | 2011|Keywords: Security management, End-user security, Security policy compliance behavior -
Towards fully verifiable forward secure privacy preserving keyword search for IoT outsourced data
Elsevier | 2021|Keywords: Cloud security, Forward security -
Identifying information security opinion leaders in organizations: Insights from the theory of social power bases and social network analysis
Elsevier | 2021|Keywords: Behavioral information security, Information security management, Information security leadership
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.