Year of publication
Type of media
Source
Subject
Type of material
Licence
Language
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
A security evaluation framework for cloud security auditing
Online Contents | 2017|Keywords: Security metrics, Cloud security, Security index -
Crowdsourcing Analysis in 5G IoT: Cybersecurity Threats and Mitigation
Online Contents | 2018|Keywords: Proactive security, 5G security -
A study on strengthening security awareness programs based on an RFID access control system for inside information leakage prevention
Online Contents | 2013|Keywords: Security awareness, Information security, Security training -
A strengthening plan for enterprise information security based on cloud computing
Online Contents | 2013|Keywords: Cloud security, Enterprise information security, Security threats -
A strengthening plan for enterprise information security based on cloud computing
Online Contents | 2013|Keywords: Cloud security, Enterprise information security, Security threats -
A Study on Acceptance Procedure Improvement of Web Application by Outsourcing for Mobile Service
Online Contents | 2016|Keywords: Security architecture, Information security, Security management -
A study on strengthening security awareness programs based on an RFID access control system for inside information leakage prevention
Online Contents | 2013|Keywords: Security awareness, Information security, Security training -
Experimental Study to Analyze the Security Performance in Wireless LANs
Online Contents | 2015|Keywords: Security strength, Security protocols, WLAN security -
A Formal Methodology for Detecting Managerial Vulnerabilities and Threats in an Enterprise Information System
Online Contents | 2010|Keywords: Security algorithm, Enterprise information security, Security management, Security policies -
Biometric-based cryptography for digital content protection without any key storage
Online Contents | 2017|Keywords: Data security, Information forensics security, Biometric-based security -
The current state and future of mobile security in the light of the recent mobile security threat reports
Online Contents | 2023|Keywords: Smartphone security, Security, Mobile security -
A Formal Methodology for Detecting Managerial Vulnerabilities and Threats in an Enterprise Information System
Online Contents | 2010|Keywords: Security algorithm, Enterprise information security, Security management, Security policies -
Biometric-based cryptography for digital content protection without any key storage
Online Contents | 2017|Keywords: Data security, Information forensics security, Biometric-based security -
A GA-LR wrapper approach for feature selection in network intrusion detection
Online Contents | 2017|Keywords: Security software -
Cloud Security Threats and Solutions: A Survey
Online Contents | 2022|Keywords: Security techniques, Cyber-security, Cloud security and threats -
Image steganography for authenticity of visual contents in social networks
Online Contents | 2017|Keywords: Information security, Multimedia security -
Prevention is better than cure! Designing information security awareness programs to overcome users' non-compliance with information security policies in banks
Online Contents | 2017|Keywords: Security management, Safety and security measures -
A framework for enhancing mobile workflow execution through injection of flexible security controls
Online Contents | 2018|Keywords: Security injection, Security controls, Security modeling -
Providing security on demand using invasive computing
Online Contents | 2016|Keywords: security and privacy – operating systems security, Security and privacy – embedded systems security, security and privacy – information flow control, Security and privacy →Systems security, Security and privacy →Systems security →Operating systems security, Security and privacy →Systems security →Information flow control -
A Study on Financing Security for Smartphones Using Text Mining
Online Contents | 2017|Keywords: Smartphone security, Security, Smartphone financing security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.