Year of publication
Type of media
Source
Type of material
Licence
Language
21–40 of 51 hits
Sort by:
Sort by:
-
Learning classical readout quantum PUFs based on single-qubit gates
Free accessDataCite | 2022|Keywords: computer security -
IT-Sicherheit, Unternehmenskulturen und wirtschaftsbedrohende Kriminalität
Free accessDataCite | 2014|Keywords: Computer security -
IT Security Support for the Spaceport Command Control Systems Development Ground Support Development Operations
NTRS | 2013|Keywords: computer security -
IT Security Support for the Spaceport Command Control Systems Development Ground Support Development Operations
NTRS | 2014|Keywords: computer security -
IT Security Support for Spaceport Command and Control System
NTRS | 2013|Keywords: computer security -
Finding noisy neighbours and quantifying performance impact
Free accessDataCite | 2021|Keywords: Anomaly detection (Computer security) -
Enhanced position verification for VANETs using subjective logic
Free accessDataCite | 2016|Keywords: Intrusion detection systems (Computer security) -
Enhanced position verification for VANETs using subjective logic
Free accessDataCite | 2016|Keywords: Intrusion detection systems (Computer security) -
Enhanced physical unclonable function structures in mixed-signal MOS technology
Free accessDataCite | 2014|Keywords: Computer security -
Energy-efficiency and security issues in the Cisco Nexus virtual distributed switching
Free accessBASE | 2012|Keywords: Computer security -
Enabling automated driving by ICT infrastructure : a reference architecture
Free accessDataCite | 2020|Keywords: Computer security -
Employee work tracking system using Version Control System and face recognition
Free accessBASE | 2014|Keywords: Computer security -
Design of the SPEEDOS operating system kernel
Free accessDataCite | 2005|Keywords: Computer security -
Designing a robust image steganography algorithm for secure cyberinfrastructure
Free accessBASE | 2019|Keywords: Digital images -- Computer Security -
Design and control of multilevel converters for grid-connected renewable energy sources
Free accessBASE | 2020|Keywords: Computer security -
Combining safety and security threat modeling to improve automotive penetration testing
Free accessDataCite | 2019|Keywords: Penetration testing (Computer security) -
Cloud security using homomorphic encryption
Free accessBASE|Keywords: Computer science;Cloud computing;Computer security;Computer networks -- Security measures;Data encryption (Computer science)
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions:
full data search
or
title and abstract search
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
TIB AV portal
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
Specialised Information Service for Mobility and Transport Research (FID move)
Open Research Knowledge Graph (ORKG)
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Common Union Catalogue (GVK)
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.