Year of publication
Subject
Type of material
Licence
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Enabling security functions with SDN: A feasibility study
Elsevier | 2015|Keywords: Network security, Software-defined networking security, SDN security -
Safety informatics as a new, promising and sustainable area of safety science in the information age
Elsevier | 2019|Keywords: Safety science, Safety information, Safety informatics, Safety 4.0 -
What safety models and principles can be adapted and used in security science?
Elsevier | 2020|Keywords: Security models, Security principles, Security management, Learning from safety -
Security Risk Assessment Methodology for the petroleum and petrochemical industries
Elsevier | 2013|Keywords: Security risk management, Security risk assessment, Chemical security, Energy security -
Safety intelligence as an essential perspective for safety management in the era of Safety 4.0: From a theoretical to a practical framework
Elsevier | 2020|Keywords: Safety intelligence (SI), Safety big data, Safety 4.0, Safety management, Safety decision-making -
Apparatus: A framework for security analysis in internet of things systems
Elsevier | 2018|Keywords: IoT Security, Security requirements, Smart cities security -
Denial of service attack detection through machine learning for the IoT
Free accessTaylor & Francis Verlag | 2020|Keywords: security, network security -
Impact of static and dynamic load models on security margin estimation methods
Elsevier | 2021|Keywords: Dynamic security margins, Dynamic security limits, Security assessment, Security margin estimation -
Security and Privacy Service Level Agreement composition for Internet of Things systems on top of standard controls
Elsevier | 2022|Keywords: Cloud security, IoT security, Security and privacy, Security SLA -
Design Considerations for Building Credible Security Testbeds: Perspectives from Industrial Control System Use Cases
Taylor & Francis Verlag | 2021|Keywords: security simulations, security modelling, cyber security simulations -
Challenges and performance metrics for security operations center analysts: a systematic review
Taylor & Francis Verlag | 2020|Keywords: Security operations center, cyber security, security analysts -
Bayesian Stackelberg games for cyber-security decision support
Elsevier | 2021|Keywords: Cyber-security, Security games, Security investment -
Safety awareness: A chemical engineering imperative*
Wiley | 2018|Keywords: safety regulations, safety history, process safety, safety incidents -
Novel security models, metrics and security assessment for maritime vessel networks
Elsevier | 2021|Keywords: Security analysis, Security metrics, Security models -
Management of nontraditional security for Vietnam’s sustainable development: an integrated approach
Free accessTaylor & Francis Verlag | 2022|Keywords: Nontraditional security, management of nontraditional security, human security, health security, individual security, environmental security -
Model-based evaluation of combinations of Shuffle and Diversity MTD techniques on the cloud
Elsevier | 2019|Keywords: Security analysis, Security metrics, Security modeling -
Root causes of coal mine accidents: Characteristics of safety culture deficiencies based on accident statistics
Elsevier | 2020|Keywords: Safety culture, Safety communication, Safety participation -
A systematic analysis of Water-Energy-Food security nexus: A South Asian case study
Elsevier | 2020|Keywords: Water security, Food security, Energy security -
A survey on registration hijacking attack consequences and protection for session initiation protocol (SIP)
Elsevier | 2020|Keywords: Network security, Sip security -
Water and U.S. national security
TIBKAT | 2017|Keywords: Security, International, Water security, National security -
The fast image encryption algorithm based on lifting scheme and chaos
Elsevier | 2020|Keywords: Information security, Security analysis -
Securing state reconstruction under sensor and actuator attacks: Theory and design
Elsevier | 2020|Keywords: Cyber–physical security, Security monitoring -
On the design of secure primitives for real world applications
Elsevier | 2020|Keywords: Hardware security, Systems security, Security engineering, Computers and networks security -
Physical unclonable functions based secret keys scheme for securing big data infrastructure communication
Elsevier | 2019|Keywords: IoT Security, Zigbee security, Hardware security -
A framework and tool for the assessment of information security risk, the reduction of information security cost and the sustainability of information security culture
Online Contents | 2021|Keywords: Information security, Information security evaluation, The ARCS security framework, Information security culture, Information security assessment, Information security cost -
Methods and models in process safety and risk management: Past, present and future
Elsevier | 2015|Keywords: Process safety, Inherent safety, Safety management -
Digital transformation and challenges to data security and privacy
TIBKAT | 2021|Keywords: Database security, Computer security ; fast, Computer security, Database security ; fast -
A 100-Year Review: Microbiology and safety of milk handling
Elsevier | 2017|Keywords: dairy food safety, cheese safety -
Regulatory approaches - Safety case vs US approach: Is there a best solution today?
Elsevier | 2017|Keywords: Safety regulations, Process safety management, Safety case -
Decision support for selecting information security controls
Taylor & Francis Verlag | 2018|Keywords: Information security, security controls, optimisation of security portfolio -
Challenges in applying process safety management at university laboratories
Elsevier | 2017|Keywords: Safety management, Process safety management, Laboratory safety -
Teachers' and students' attitudes towards information security: A qualitative study
Wiley | 2020|Keywords: information security, information security behavior, information security motivation, information security tools -
A parallel image encryption algorithm based on the piecewise linear chaotic map and hyper-chaotic map
Online Contents | 2018|Keywords: Image security, Security analysis -
Towards an extended food safety culture model: Studying the moderating role of burnout and jobstress, the mediating role of food safety knowledge and motivation in the relation between food safety climate and food safety behavior
Elsevier | 2017|Keywords: Food safety climate, Food safety culture, Food safety management, Food safety behavior -
OSCAR: Object security architecture for the Internet of Things
Elsevier | 2014|Keywords: Communication security, Object security, End-to-end security -
Government regulations in cyber security: Framework, standards and recommendations
Elsevier | 2018|Keywords: Cyber security, Information security -
CAAVI-RICS model for observing the security of distributed IoT and edge computing systems
Elsevier | 2020|Keywords: Cyber-security, Distributed security -
Information security management in SOCs and SICs
IOS Press | 2018|Keywords: Information security, information security management, Security Operations Center, Security Intelligence Center, information security incident -
Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
Elsevier | 2009|Keywords: Information security, End-user security behaviors, Security policy compliance -
Safety management and safety outcomes in oil and gas industry in Malaysia: Safety compliance as a mediator
Wiley | 2022|Keywords: safety management, safety outcomes, safety compliance -
Security of Satellite-Terrestrial Communications: Challenges and Potential Solutions
Free accessDOAJ | 2022|Keywords: Security, network security, satellite security, communications security, NTN security -
All-Or-Nothing data protection for ubiquitous communication: Challenges and perspectives
Elsevier | 2019|Keywords: Data security, Multimedia security -
Security versus convenience? An experimental study of user misperceptions of wireless internet service quality
Elsevier | 2011|Keywords: Information security, Security/convenience tradeoff, Security engineering -
Process safety indicators, a review of literature
Elsevier | 2015|Keywords: Process safety indicator, Safety metaphor, Occupational safety, Process safety -
Determinants for conducting food safety culture research
Elsevier | 2016|Keywords: Safety culture, Food safety culture, Food safety management system, Food safety performance -
Scientific and Methodological Approach to Assessing the Level of Banks’ Financial Security
Springer Verlag | 2020|Keywords: Financial security, Financial security components, Security of deposit transactions, Security of credit transactions, Security of cash transactions, Security of investment transactions, Security of currency transactions, A financial security indicator, Level of financial security -
Semantic security against web application attacks
Elsevier | 2013|Keywords: Application security, Semantic security -
Social network security: Issues, challenges, threats, and solutions
Elsevier | 2017|Keywords: Security and privacy, Security threats -
The Ten Most Common Laboratory Safety Issues
American Chemical Society | 2022|Keywords: research safety, safety, safety issues, laboratory safety
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.