Year of publication
Subject
Type of material
Licence
TIB reading rooms collection
LUH institutes collection
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Security versus convenience? An experimental study of user misperceptions of wireless internet service quality
Elsevier | 2011|Keywords: Information security, Security/convenience tradeoff, Security engineering -
Scientific and Methodological Approach to Assessing the Level of Banks’ Financial Security
Springer Verlag | 2020|Keywords: Financial security, Financial security components, Security of deposit transactions, Security of credit transactions, Security of cash transactions, Security of investment transactions, Security of currency transactions, A financial security indicator, Level of financial security -
Swoistość terminologii stosowanej w naukach o bezpieczeństwie
Free accessDOAJ | 2019|Keywords: security studies, theory of security, security terminology, security doctrine -
Retrospective Analysis of the Main Indicators of Ukraine's Financial Security
Free accessDOAJ | 2019|Keywords: security, financial security, financial security indicators, bank security, monetary security -
The Cooperative Security Dilemma in the Baltic Sea Region
Taylor & Francis Verlag | 2011|Keywords: security dilemma, security communities, European security, regional security -
A framework for secure IT operations in an uncertain and changing environment
Elsevier | 2017|Keywords: Information security, IT security management, Security investment decisions -
The BPSec Security Mechanism
Wiley | 2023|Keywords: BPSec Security Mechanism, Security Operations, Security Contexts, Security Blocks, Other Security Blocks -
A dangerous synergy: energy securitization, great power rivalry and strategic stability in the Asian century
Taylor & Francis Verlag | 2013|Keywords: Energy security, Asia-Pacific security, economic security -
The Political Cost-Effectiveness of Private Vessel Protection: The Italian Case
Taylor & Francis Verlag | 2018|Keywords: Maritime security, private security, private military and security companies -
Cyber breach response that actually works : organizational approach to managing residual risk
TIBKAT | 2020|Keywords: Computer security ; Management, Computer security -
Machine learning-enhanced hybrid cryptography and image steganography algorithm for securing cloud data
IOS Press | 2024|Keywords: Data security, security -
Sino-Mongolian relations and Mongolia's non-traditional security
Taylor & Francis Verlag | 2013|Keywords: political security, economic security, non-traditional security -
Not all areas are equal: analysis of citations in information security research
Online Contents | 2019|Keywords: Information security, Science of security, Cyber security -
Stackelberg game modeling of cloud security defending strategy in the case of information leaks and corruption
Elsevier | 2020|Keywords: Cloud security, Security threat modeling -
The Design of the Enterprise Network Security Solutions
National licenceTrans Tech Publications | 2014|Keywords: Security, Network Security, Windows Security -
Taming the bear: American liquified natural gas (LNG) exports and the negation of Russian influence in Europe
Taylor & Francis Verlag | 2020|Keywords: Energy security, European security -
CARMEN: A framework for the verification and diagnosis of the specification of security requirements in cyber-physical systems
Elsevier | 2021|Keywords: Security, Security requirements, Security verification -
A quantitative examination of the intellectual profile and evolution of information security from 1965 to 2015
Online Contents | 2015|Keywords: Computer security, Network security, Cyber security -
Immersive technology-driven investigations on influence factors of cognitive load incurred in construction site hazard recognition, analysis and decision making
Elsevier | 2021|Keywords: Construction safety, Safety hazard, Safety education -
Automating Security Risk and Requirements Management for Cyber-Physical Systems
Free accessBASE | 2020|Keywords: Security risk management, Machine-readable security requirements, Risk-driven security, Security engineering, Security requirements, Security risk assessment, Security risk mitigation, Security risk monitoring, Automotive security, CPS security, IIoT security, OT security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.