Year of publication
Subject
Type of material
Licence
Language
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
The legal issues of the substantiation of new types of national security
Free accessDOAJ | 2020|Keywords: security, national security, national security strategy, types of national security, moral security, cultural security -
Denial of service attack detection through machine learning for the IoT
Free accessTaylor & Francis Verlag | 2020|Keywords: security, network security -
How does overconfidence affect information security investment and information security performance?
Taylor & Francis Verlag | 2021|Keywords: Information security, information security investment, information security performance -
An exploratory prioritization of factors affecting current state of information security in Pakistani university libraries
Free accessDOAJ | 2021|Keywords: Data security in libraries, Information security, Digital security, Information systems security -
Contemporary indicators of security. An attempt to measure the level of security.
Free accessDOAJ | 2020|Keywords: security, security threats, security indicators, security measurement -
STORE: Security Threat Oriented Requirements Engineering Methodology
Free accessDOAJ | 2022|Keywords: Security requirements engineering, Security requirements elicitation, Software security, Security attack analysis -
Risk management-based security evaluation model for telemedicine systems
Free accessDOAJ | 2020|Keywords: Telemedicine security, Medical information security, Smart medical security, Telecare security -
On the Security Risks of the Blockchain
Taylor & Francis Verlag | 2020|Keywords: Security, security recommendations -
Costs and benefits of business information security
Free accessDOAJ | 2023|Keywords: information security, information security economics, information security costs, information security benefits, economic security, information security budget -
Machine learning-enhanced hybrid cryptography and image steganography algorithm for securing cloud data
IOS Press | 2024|Keywords: Data security, security -
Exploring a New Security Framework for Remote Patient Monitoring Devices
Free accessDOAJ | 2017|Keywords: telehealth security, telemedicine security, remote patient monitoring security -
Dying of a hundred good symptoms: why good security can still fail - a literature review and analysis
Taylor & Francis Verlag | 2021|Keywords: information security, Enterprise Information Security Architecture (EISA), security failures -
A Botnets Circumspection: The Current Threat Landscape, and What We Know So Far
Free accessDOAJ | 2019|Keywords: cyber security, network security, information security -
Survey and Classification of Automotive Security Attacks
Free accessDOAJ | 2019|Keywords: automotive security, security attacks -
Security Awareness: The First Step in Information Security Compliance Behavior
Taylor & Francis Verlag | 2021|Keywords: information security, security visibility, security policy -
The South African security predicament: making sense of the objective realities
Free accessDOAJ | 2021|Keywords: security threats, south african security predicament, security predicament -
A Framework for Measuring Security as a System Property in Cyberphysical Systems
Free accessDOAJ | 2016|Keywords: computer security, information security, security assessment -
A Holistic Analysis of Internet of Things (IoT) Security: Principles, Practices, and New Perspectives
Free accessDOAJ | 2024|Keywords: security, communication security, device security, service security -
Privacy-respecting smart video surveillance based on usage control enforcement
Free accessFraunhofer Publica | 2016|Keywords: Sicherheit -
Digital Transformation Security Challenges
Taylor & Francis Verlag | 2023|Keywords: Digital strategy security, IS/IT strategy security, information security, digital security -
Continuous fields: Enhanced in-vehicle anomaly detection using machine learning models
Free accessFraunhofer Publica | 2020|Keywords: security monitoring, Controller area network security, automotive security -
Indonesia Cyber Security : Urgency To Establish Cyber Army In The Middle Of Global Terrorist Threat
Free accessDOAJ | 2018|Keywords: cyber security, national security, human security -
Examining and Analyzing ChatGPT from the Perspective of Digital Security
Free accessDOAJ | 2023|Keywords: |digital security|chatgpt|network security|information security|social security|cognitive security|weapon and equipment -
Optimistic Bias and Exposure Affect Security Incidents on Home Computer
Taylor & Francis Verlag | 2022|Keywords: Security education, security breaches, security incidents -
Revisiting the Environmental Security Concept: Climate Change as a Security Issue
Free accessDOAJ | 2021|Keywords: enviromental security, security studies, human security, ecological security -
Method for assessing efficiency of the information security management system
Free accessDOAJ | 2018|Keywords: security, security system, security configuration, configuration of security measures, loss of efficiency of the security system -
Security Education, Training, and Awareness Programs: Literature Review
Taylor & Francis Verlag | 2022|Keywords: security education, organizational security -
REDEFINING INDONESIA’S NATIONAL SECURITY IN ENSURING THE SURVIVAL OF THE NATION
Free accessDOAJ | 2019|Keywords: civil security, international security, knowledge-based security, rule-based security, skill-based security, state security -
A Metamodel for Web Application Security Evaluation
Free accessDOAJ | 2023|Keywords: software security, web application security, security evaluation -
Comparison of Information Security Systems for Asymptotic Information Security Management Critical Information Infrastructures
Free accessDOAJ | 2021|Keywords: information security, security incedents, security events -
Implementation of nuclear safety cases
Taylor & Francis Verlag | 2020|Keywords: Safety case implementation, Safety Designations, Safety Case Summary for Operators, safety assessment -
Assessment of Cybersecurity Awareness among Students of Majmaah University
Free accessDOAJ | 2021|Keywords: security awareness, information security -
BYOD Security: A Study of Human Dimensions
Free accessDOAJ | 2022|Keywords: BYOD security, BYOD security practices, BYOD security awareness, BYOD security framework -
Building safer robots: Safety driven control
SAGE Publications | 2012|Keywords: safety-driven control, safety protection system, Robot safety -
Old and New Trends in Security Theory
Free accessDOAJ | 2020|Keywords: intermestic security, externalisation of security, exteriorisation of security, selfisation of security, ourfisation of security -
NATIONAL SECURITY CONCEPT
Free accessDOAJ | 2018|Keywords: national security, security concept, national security concept, constituents of the national security -
SlowTT: A Slow Denial of Service against IoT Networks
Free accessDOAJ | 2020|Keywords: protocols security, cyber security, network security -
An Effectual Secured Approach Against Sybil Attacks in Wireless Networks
Free accessDOAJ | 2022|Keywords: Network Security, Wireless Network Security, Security in Wireless Environment -
ASPECTS OF POLICIES AND STRATEGIES FOR CYBER SECURITY IN THE EUROPEAN UNION
Free accessDOAJ | 2015|Keywords: national security, cyber security, national security strategy, cyber security strategy -
Editorial: Human-Centric Security and Privacy
Free accessDOAJ | 2022|Keywords: cyber security, human-centric security, usable security, HCI and cyber security -
CLOUD SECURITY AND COMPLIANCE - A SEMANTIC APPROACH IN END TO END SECURITY
Free accessDOAJ | 2017|Keywords: cloud security, Security compliance models, Cloud security models. -
Usable Security: A Systematic Literature Review
Free accessDOAJ | 2023|Keywords: usable security, security, cyber-security -
A survey of phishing attack techniques, defence mechanisms and open research challenges
Taylor & Francis Verlag | 2022|Keywords: web security, mobile security -
Anatomy of Security Dimensions from the perspective of Ayatollah Mahdavi Kenny
Free accessDOAJ | 2019|Keywords: security, security dimensions, ethical security -
A Sensitive Data Access Model in Support of Learning Health Systems
Free accessDOAJ | 2021|Keywords: network security, communication system security, data security -
Blockchain Technology - Based Solutions for IOT Security
Free accessDOAJ | 2022|Keywords: Blockchain, IoT security, Blockchain technology, Network security, Data security -
What Is This Sensor and Does This App Need Access to It?
Free accessDOAJ | 2019|Keywords: sensor security, security education, mobile security awareness, user security -
IoT-based Application of Information Security Triad
Free accessDOAJ | 2021|Keywords: Security of IoT, Information Security, Security Triad -
DURASec: Durable Security Blueprints for Web-Applications Empowering Digital India Initiative
Free accessDOAJ | 2022|Keywords: Durable Security, Cyber-security, Security risk -
HUMAN SECURITY: CONSEQUENCE OF AND INCENTIVE FOR NATIONAL AND INTERNATIONAL SECURITY
Free accessDOAJ | 2011|Keywords: human security, economic security, food security, environment security, personal security, community and political security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.