Year of publication
Type of media
Type of material
Licence
Synonyms were used for: Datensicherheit
Search without synonyms: keywords:(Datensicherheit)
Used synonyms:
- data integrity
- data security
- datenintegritat
- datensicherung
- security of data
-
Utilizing pseudo-spaces to improve Arabic text steganography for multimedia data communications
Springer Verlag | 2020|Keywords: Data security -
Utilizing gestures to enable visually impaired for computer interaction
Springer Verlag | 2019|Keywords: Systems and Data Security -
Using the 3D Protein Structure as Key to Encrypt Images
Free accessDOAJ | 2023|Keywords: Data-security -
Using the 3D Protein Structure as Key to Encrypt Images
Free accessDOAJ | 2023|Keywords: Data-security -
Using templates to distinguish multiplications from squaring operations
Online Contents | 2011|Keywords: Datensicherung -
Using targeted Bayesian network learning for suspect identification in communication networks
Online Contents | 2017|Keywords: Datensicherung -
Using SCADA data for wind turbine condition monitoring – a review
Free accessWiley | 2017|Keywords: security of data -
Using SCADA data for wind turbine condition monitoring – a review
Free accessIET | 2017|Keywords: security of data -
Using penetration testing feedback to cultivate an atmosphere of proactive security amongst end-users
Emerald Group Publishing | 2009|Keywords: Data security -
Using Node Identifiers and Community Prior for Graph-Based Classification
Free accessSpringer Verlag | 2018|Keywords: Systems and Data Security -
Using modified prediction interval-based machine learning model to mitigate data attack in microgrid
Elsevier | 2021|Keywords: Data integrity -
Using maintenance records from a long-term sensor monitoring network to evaluate the relationship between maintenance schedule and data quality
Online Contents | 2019|Keywords: Data integrity -
Using maintenance records from a long-term sensor monitoring network to evaluate the relationship between maintenance schedule and data quality
Springer Verlag | 2019|Keywords: Data integrity -
Using instance-weighted naive Bayes for adapting concept drift in masquerade detection
Online Contents | 2014|Keywords: Datensicherung -
Using informatics to improve healthcare quality
Emerald Group Publishing | 2019|Keywords: Data security -
Using homomorphic encryption for privacy-preserving clustering of intrusion detection alerts
Online Contents | 2020|Keywords: Datensicherung -
Using Hierarchical Timed Coloured Petri Nets in the formal study of TRBAC security policies
Online Contents | 2019|Keywords: Datensicherung -
Using GUHA Data Mining Method in Analyzing Road Traffic Accidents Occurred in the Years 2004–2008 in Finland
Free accessSpringer Verlag | 2017|Keywords: Systems and Data Security -
Using crime data in academic research: issues of comparability and integrity
Emerald Group Publishing | 2015|Keywords: Data integrity -
Using contourlet transform and cover selection for secure steganography
Online Contents | 2010|Keywords: Datensicherung -
Using continuous user authentication to detect masqueraders
Emerald Group Publishing | 2003|Keywords: Data security -
Using biological models to improve innovation systems
The case of computer anti-viral softwareEmerald Group Publishing | 2007|Keywords: Data security -
Using assignment model as an automated recovery system
Emerald Group Publishing | 2005|Keywords: Data security -
Using a Chaotic Digital System to Generate Random Numbers for Secure Communication on 5G Networks
Free accessDOAJ | 2024|Keywords: data security -
User-Silicon Entangled Mobile Identity Authentication
Springer Verlag | 2020|Keywords: Systems and Data Security -
User-mediated authentication protocols and unforgeability in key collision
Online Contents | 2019|Keywords: Datensicherung -
User interface design affects security: patterns in click-based graphical passwords
Online Contents | 2009|Keywords: Datensicherung -
User identification using deep learning and human activity mobile sensor data
Online Contents | 2022|Keywords: Datensicherung -
User-friendly and certificate-free grid security infrastructure
Online Contents | 2011|Keywords: Datensicherung -
User-centred security applied to the development of a management information system
Emerald Group Publishing | 2007|Keywords: Data security -
User authentication and access control to blockchain-based forensic log data
Free accessSpringer Verlag | 2023|Keywords: Systems and Data Security -
Use of SHDM in commutative watermarking encryption
Free accessSpringer Verlag | 2021|Keywords: Systems and Data Security -
USB-Watch: a Generalized Hardware-Assisted Insider Threat Detection Framework
Springer Verlag | 2020|Keywords: Systems and Data Security -
USBCaptchaIn: Preventing (un)conventional attacks from promiscuously used USB devices in industrial control systems1
IOS Press | 2020|Keywords: data integrity protection -
Usable set-up of runtime security policies
Emerald Group Publishing | 2007|Keywords: Data security -
Usable secure email communications: criteria and evaluation of existing approaches
Emerald Group Publishing | 2013|Keywords: Data security -
URL query string anomaly sensor designed with the bidimensional Haar wavelet transform
Online Contents | 2015|Keywords: Datensicherung -
Urban traffic volume estimation using intelligent transportation system crowdsourced data
Elsevier | 2023|Keywords: Partial traffic data integrity -
Updatable privacy-preserving K-nearest neighbor query in location-based s-ervice
Springer Verlag | 2022|Keywords: Data security update -
Unsupervised Qualitative Scoring for Binary Item Features
Free accessSpringer Verlag | 2020|Keywords: Systems and Data Security -
Unsupervised Approach for Email Spam Filtering using Data Mining
Free accessDOAJ | 2021|Keywords: data security -
Unsupervised approach for detecting shilling attacks in collaborative recommender systems based on user rating behaviours
Free accessIET | 2019|Keywords: security of data -
Unravelling Security Issues of Runtime Permissions in Android
Springer Verlag | 2018|Keywords: Systems and Data Security -
Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol
Online Contents | 2016|Keywords: Datensicherung -
Unlinkable improved multi-biometric iris fuzzy vault
Free accessSpringer Verlag | 2016|Keywords: Systems and Data Security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.