Year of publication
Type of material
Licence
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Security threats to critical infrastructure: the human factor
Free accessOnline Contents | 2018|Keywords: Security awareness, Cyber security training, Security threats against critical infrastructure, Critical infrastructure security, Work-based security training -
Review on soft target/public space protection guidance
Free accessEU Bookshop | 2018|Keywords: europäische Sicherheit, internationale Sicherheit, Sicherheit einer geografischen Region, öffentliche Sicherheit -
ICT Security Measures for the Companies within European Union Member States – Perspectives in COVID-19 Context
Free accessDOAJ | 2020|Keywords: ict security, security policy, security measures, company ict security, security incidents -
The legal issues of the substantiation of new types of national security
Free accessDOAJ | 2020|Keywords: security, national security, national security strategy, types of national security, moral security, cultural security -
Masking Proofs are Tight and How to Exploit it in Security Evaluations
Free accessBASE | 2018|Keywords: Security level, Security evaluation -
Cyber security meets security politics: Complex technology, fragmented politics, and networked science
Free accessTaylor & Francis Verlag | 2020|Keywords: Cyber security, international security, security studies -
Information Security and People: A Conundrum for Compliance
Free accessBASE | 2017|Keywords: security compliance, security management, end user security behaviour -
Security Requirements and Challenges of 6G Technologies and Applications
Free accessDOAJ | 2022|Keywords: 6G security, security architecture, security threats, physical layer security -
Denial of service attack detection through machine learning for the IoT
Free accessTaylor & Francis Verlag | 2020|Keywords: security, network security -
Cyber Security Challenges & Their Solutions in India
Free accessBASE | 2022|Keywords: security systems, cyber security, security tools -
Crafting and reinforcing the state through security privatisation: territorialisation as a public–private state project in East Jerusalem
Free accessTaylor & Francis Verlag | 2019|Keywords: Security privatisation, private security companies, security assemblages -
The market for ontological security
Free accessTaylor & Francis Verlag | 2018|Keywords: private security companies, ontological security, collective security community -
The Information Security Cultures of Journalism
Free accessTaylor & Francis Verlag | 2020|Keywords: Information security, security culture -
Deciphering China in the Middle East
Free accessEU Bookshop | 2020|Keywords: europäische Sicherheit, internationale Sicherheit, Sicherheit einer geografischen Region -
An exploratory prioritization of factors affecting current state of information security in Pakistani university libraries
Free accessDOAJ | 2021|Keywords: Data security in libraries, Information security, Digital security, Information systems security -
The leadership practices of construction site managers and their influence on occupational safety: an observational study of transformational and passive/avoidant leadership
Free accessTaylor & Francis Verlag | 2019|Keywords: safety, occupational safety, safety climate, safety-related behaviour -
Effect of safety climate on safety behavior in employees: The mediation of safety motivation
Free accessBASE | 2019|Keywords: safety behavior, safety climate, safety motivation -
Management of nontraditional security for Vietnam’s sustainable development: an integrated approach
Free accessTaylor & Francis Verlag | 2022|Keywords: Nontraditional security, management of nontraditional security, human security, health security, individual security, environmental security -
Security Warning Life Cycle: Challenges and Panacea
Free accessBASE | 2017|Keywords: Security, Security Dialogues, Security Warning, Usable Security -
Integrated Model of Knowledge Management for Security of Information Technologies: Standards ISO/IEC 15408 and ISO/IEC 18045
Free accessBASE | 2019|Keywords: information security, IT security, security standards -
Determinants of gender differences in household food security perceptions in the Western and Eastern regions of Kenya
Free accessTaylor & Francis Verlag | 2019|Keywords: food security, food security perceptions -
Qualitative Assessment on Effectiveness of Security Approaches towards Safeguarding NFC Devices & Services
Free accessBASE | 2018|Keywords: Mobile security, Security, Wireless security -
Automating Security Risk and Requirements Management for Cyber-Physical Systems
Free accessFraunhofer Publica | 2020|Keywords: security risk management, CPS security, risk-driven security, security requirements, IIoT security, OT security, automotive security -
STORE: Security Threat Oriented Requirements Engineering Methodology
Free accessDOAJ | 2022|Keywords: Security requirements engineering, Security requirements elicitation, Software security, Security attack analysis -
Risk management-based security evaluation model for telemedicine systems
Free accessDOAJ | 2020|Keywords: Telemedicine security, Medical information security, Smart medical security, Telecare security -
Contemporary indicators of security. An attempt to measure the level of security.
Free accessDOAJ | 2020|Keywords: security, security threats, security indicators, security measurement -
Japan as a global military power : new capabilities, alliance integration, bilateralism-plus
Free accessGWLB - Gottfried Wilhelm Leibniz Bibliothek | 2022|Keywords: National security, Security, International -
An Analysis of the State of Electron Security in the Wild
Free accessBASE | 2020|Keywords: it security, application security, web security -
Japan as a global military power : new capabilities, alliance integration, bilateralism-plus
Free accessTIBKAT | 2022|Keywords: National security, Security, International -
The national security field under conditions of armed aggression of the Russian Federation against Ukraine in 2022
Free accessDOAJ | 2022|Keywords: security, security space, international (global) security, national security, military security, information security -
Security by design : Schutz des öffentlichen Raums vor terroristischen Anschlägen.
Free accessEU Bookshop | 2024|Keywords: öffentliche Sicherheit, europäische Sicherheit, Sicherheit kritischer Infrastrukturen -
Security challenges
Free accessGWLB - Gottfried Wilhelm Leibniz Bibliothek | Vol. 1, no. 1 (2005)-Keywords: Regionale internationale Sicherheit, Internationale Sicherheit, Kollektive Sicherheit -
Security threats to critical infrastructure: the human factor
Free accessSpringer Verlag | 2018|Keywords: Critical infrastructure security, Security awareness, Cyber security training, Work-based security training, Security threats against critical infrastructure -
Making Masking Security Proofs Concrete Or How to Evaluate the Security of any Leaking Device
Free accessBASE | 2015|Keywords: Security proofs -
Security by design : protection of public spaces from terrorist attacks.
Free accessEU Bookshop | 2022|Keywords: öffentliche Sicherheit, europäische Sicherheit, Sicherheit kritischer Infrastrukturen -
Assessment of economic security of enterprises: theoretical and methodological aspects
Free accessDOAJ | 2020|Keywords: security, economic security, assessment of economic security -
A guide to key information on the protection of public spaces
Free accessEU Bookshop | 2021|Keywords: öffentliche Sicherheit, europäische Sicherheit, Sicherheit kritischer Infrastrukturen -
Verification of Security Protocols (Invited Talk)
Free accessDataCite | 2020|Keywords: Security protocols, security, Security and privacy → Formal security models -
Security by design : protection of public spaces from terrorist attacks.
Free accessEU Bookshop | 2022|Keywords: öffentliche Sicherheit, europäische Sicherheit, Sicherheit kritischer Infrastrukturen -
Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment
Free accessBASE | 2015|Keywords: Security, Side-channel security, Computational security, Security assessment -
Analysis of the Approaches to the Assessment of Regional Processes of Formation of Social and Economic Security
Free accessDOAJ | 2016|Keywords: social and economic security of regions, security challenges, threats to security, security provision, national security strategy, methods for assessing socio-economic security, security assessment, security threshold value, security forecasting -
Strategic leadership in cyber security, case Finland
Free accessTaylor & Francis Verlag | 2021|Keywords: Cyber security, national security -
Eliciting and refining requirements for comprehensible security
Free accessFraunhofer Publica | 2016|Keywords: information security, comprehensible security, security requirements -
Improving software security awareness using a serious game
Free accessIET | 2018|Keywords: security related scenarios, security education, software security awareness, security of data, Cyber Security-Requirements Awareness Game -
Web Application Security (Dagstuhl Seminar 18321)
Free accessDataCite | 2019|Keywords: Web Application Security, Human Aspects in Security, Browser Security, Software Security -
Real-Time Monitoring and Management of Hardware and Software Resources in Heterogeneous Computer Networks through an Integrated System Architecture
Free accessDOAJ | 2023|Keywords: network security, security monitoring, information security, computer security, data security -
An Effective Security Requirements Engineering Framework for Cyber-Physical Systems
Free accessDOAJ | 2018|Keywords: security requirements, security requirements engineering, security goal -
An Exploratory Study Gathering Security Requirements for the Software Development Process
Free accessDOAJ | 2023|Keywords: software security, security software process, security software methodologies, security testing -
Eliciting and refining requirements for comprehensible security
Free accessBASE | 2016|Keywords: information security, security requirements, comprehensible security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.