Year of publication
Subject
Type of material
Licence
TIB reading rooms collection
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Your memory is working against you: How eye tracking and memory explain habituation to security warnings
Elsevier | 2016|Keywords: Security warnings, Behavioral information security -
Monte Carlo-Based Localization for Kidnapped Robot Problem
TIBKAT | 2020|Keywords: National security, Computer security -
Truly random number generation: an example [8899-30]
British Library Conference Proceedings | 2013|Keywords: Quantum security, Security, Information security -
Essential elements lacking in security proofs for quantum key distribution (Invited Paper) [8899-21]
British Library Conference Proceedings | 2013|Keywords: Quantum security, Security, Information security -
Determination of Optimal Procedures for Maintenance and Repair Operations of the GDU-620 Garmin Applied to the DA20C-1 Aircraft
TIBKAT | 2020|Keywords: National security, Computer security -
Ackermann UGV with 2D Mapping for Unknown Environments
TIBKAT | 2020|Keywords: National security, Computer security -
Towards a high-speed quantum random number generator [8899-29]
British Library Conference Proceedings | 2013|Keywords: Quantum security, Security, Information security -
Securing the Perimeter : Deploying Identity and Access Management with Free Open Source Software
TIBKAT | 2018|Keywords: Security, Computer security -
Expert Nutritional System for Military Athletes Based on Fuzzy Logic and Inferential Statistics
TIBKAT | 2020|Keywords: National security, Computer security -
Research on computer network information security based on improved machine learning
IOS Press | 2020|Keywords: security potential perception, intrusion security detection, Network information security -
Strengthening Safety Compliance in Nuclear Power Operations: A Role‐Based Approach
Wiley | 2014|Keywords: nuclear safety, safety performance, safety procedures -
The penetration tester's guide to web applications
TIBKAT | 2019|Keywords: Penetration testing (Computer security), Computer security -
The Information Security and IT Security Questions of Pension Payment
National licenceTrans Tech Publications | 2017|Keywords: Information Security, Pension Security, IT Security -
Developments in information security and cybernetic wars
TIBKAT | 2019|Keywords: Computer security -
Managing security work in scrum: Tensions and challenges
Free accessFraunhofer Publica | 2017|Keywords: security work, software security, security requirements -
Robustness of Optimal Investment Decisions in Mixed Insurance/Investment Cyber Risk Management
Wiley | 2020|Keywords: security economics, security investments -
BYOD usage and security behaviour of hospital clinical staff: An Australian survey
Elsevier | 2022|Keywords: Security, Health information security -
Fuzzy‐Logic‐Based Safety Verification Framework for Nuclear Power Plants
Wiley | 2013|Keywords: NPP safety, nuclear power plant safety, safety verification -
The 21st Century CISO
Free accessSpringer Verlag | 2013|Keywords: Security Issue, Security Group, Security Investment, Security Organization, Security Initiative, Security -
Critical Security Studies and World Politics
GWLB - Gottfried Wilhelm Leibniz Bibliothek | 2022|Keywords: POLITICAL SCIENCE / Security (National & International) -
An economic mechanism for better Internet security
Elsevier | 2008|Keywords: Information Security, Internet security, Interdependent security -
Utilizing safety rule correlation for mobile scaffolds monitoring leveraging deep convolution neural networks
Elsevier | 2021|Keywords: Safety rule compliance, Safety risk correlation pattern, Safety monitoring -
Emulating representative software vulnerabilities using field data
Online Contents | 2018|Keywords: Security, Security vulnerabilities -
Malware Author Profiles
Springer Verlag | 2019|Keywords: Systems and Data Security, Crime Control and Security, Security Science and Technology, Security Services, Mobile and Network Security -
Journal of Biosecurity, Biosafety and Biodefense Law : JBBBL
National licenceTIBKAT | 1.2011 -Keywords: Biologische Sicherheit -
Women, peace and security state-of-art: a bibliometric analysis in social sciences based on SCOPUS database
Online Contents | 2017|Keywords: Security, Peace and security -
A Survey of Public Key Infrastructure-Based Security for Mobile Communication Systems
Free accessDOAJ | 2016|Keywords: PKI security, mobile communication security, GSM-authentication and key agreement (AKA) security, CDMA-AKA security, long term evolution-authentication and key agreement (LTE-AKA) security -
Determining the safety culture in a gun factory in Turkey: A fuzzy approach
IOS Press | 2020|Keywords: safety perception, safety culture assessment, workplace safety, safety culture -
(Mis)understanding Safety Culture and Its Relationship to Safety Management
Wiley | 2010|Keywords: safety culture, safety management system, safety culture assessment -
An efficient approach for design optimization of structures involving fuzzy variables
Elsevier | 2014|Keywords: Possibilistic safety, Possibilistic safety index -
Advanced Security Assurance Case Based on ISO/IEC 15408
Springer Verlag | 2015|Keywords: information security, security assurance, advance security assurance case -
Ransomware Revealed : A Beginner’s Guide to Protecting and Recovering from Ransomware Attacks
TIBKAT | 2019|Keywords: Security -
Methodology for Assessing the Level of the Territory’s Economic Security
Springer Verlag | 2020|Keywords: Economic security, Demographic security, Financial security, Investment security, Level of economic security of the territory -
Cyber-physical systems security: Limitations, issues and future trends
Elsevier | 2020|Keywords: Cyber-security threats, Security, Security and performance analysis -
Secret information security system in computer network based on Bayesian classification and nonlinear algorithm
Free accessDeGruyter | 2022|Keywords: security index, security secret, information security -
Quick Start Guide to Penetration Testing : with NMAP, OpenVAS and Metasploit
TIBKAT | 2019|Keywords: Security, Computer security -
Multi-biometric cryptosystem using graph for secure cloud authentication
IOS Press | 2020|Keywords: Cloud security, cloud database security, biometric cloud security, template security -
Resilience Engineering's Potential for Advanced Air Mobility (AAM)
NTRS | 2021|Keywords: Safety-II, Air Transportation And Safety, Aviation Safety -
An Intelligent Improvement of Internet-Wide Scan Engine for Fast Discovery of Vulnerable IoT Devices
Free accessDOAJ | 2018|Keywords: security, intelligent security -
System Administration Ethics : Ten Commandments for Security and Compliance in a Modern Cyber World
TIBKAT | 2019|Keywords: Security, Computer security -
Cyber hygiene: The concept, its measure, and its initial tests
Elsevier | 2019|Keywords: Cyber security, Science of cyber security -
Cybersecurity risk management : mastering the fundamentals using the NIST cybersecurity framework
TIBKAT | 2022|Keywords: Computer security -
Security of interdependent and identical networked control systems
Elsevier | 2012|Keywords: Interdependent security, System security -
A Review of the Economic Botany of Sesbania (Leguminosae)
Online Contents | 2019|Keywords: Food security, Health security -
Financial Cybersecurity Risk Management : Leadership Perspectives and Guidance for Systems and Institutions
TIBKAT | 2019|Keywords: Systems and Data Security, Computer security -
Security-as-a-Service in Multi-cloud and Federated Cloud Environments
Free accessSpringer Verlag | 2015|Keywords: Application security, Data security, Cloud security, Systems and Data Security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.