Year of publication
Type of media
Source
Subject
Type of material
Licence
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
A risk-driven security analysis method and modelling language
Online Contents | 2007|Keywords: Security Management, Security Requirement -
Optimal Security Proofs for Full Domain Hash, Revisited
Online Contents | 2017|Keywords: Security reduction -
On the implementation of security policies with adaptative encryption
Tema Archive | 2006|Keywords: Sicherheit -
Interference Alignment for the Multiantenna Compound Wiretap Channel
Tema Archive | 2011|Keywords: Sicherheit -
Growth in adversity: non-economic factors in telecommunications development in China
Tema Archive | 2003|Keywords: Sicherheit, nationale Sicherheit -
An Android runtime security policy enforcement framework
Online Contents | 2011|Keywords: Android security -
Enhancing Secrecy Rate in Cognitive Radio Networks via Stackelberg Game
Online Contents | 2016|Keywords: information security, Security -
Precondition of a Routing Algorithm Dealing with Multiple Security Metrics
Tema Archive | 2011|Keywords: Sicherheit -
Applying episode mining and pruning to identify malicious online attacks
Online Contents | 2017|Keywords: Safety and security measures -
Current Labor Shortage Affects Safety, Survey Finds
Online Contents | 2015Keywords: Safety and security measures -
The New Wave of Warfare - Battling to Dominate the Electromagnetic Spectrum
Online Contents | 2015|Keywords: National security -
OSHA Issues Recommendations for Safety and Health Programs in Construction
Online Contents | 2016Keywords: Occupational health and safety -
Smart grid security – an overview of standards and guidelines
Online Contents | 2017|Keywords: NISTIR 7628 Guidelines for Smart Grid Cyber Security, Smart Grid Information Security, Smart Grid Security -
Semantic enrichment of spatio-temporal trajectories for worker safety on construction sites
Online Contents | 2019|Keywords: Safety -
Security risk management in the BT HP alliance
Online Contents | 2006|Keywords: Security Risk, Security Control -
Ultra-wide bandwidth systems for the surveillance of railway crossing Areas
Online Contents | 2015|Keywords: Safety, Safety management, Safety and security measures, Traffic safety -
Automata-based symbolic string analysis for vulnerability detection
Online Contents | 2013|Keywords: Web application security -
SIGINT Makes Inroads into Challenging Border Security Market
Online Contents | 2015|Keywords: National security -
TECHNOLOGY SURVEY: A SAMPLING OF COMINT/DF RECEIVERS
Online Contents | 2015|Keywords: National security -
Illinois Metal Plating Company Exposes Workers to Hazards at Cicero Plant
Online Contents | 2015Keywords: Safety regulations -
Survey on channel reciprocity based key establishment techniques for wireless systems
Online Contents | 2015|Keywords: Network security -
Security and privacy in localization for underwater sensor networks
Online Contents | 2015|Keywords: Network security -
A new algorithm based on auxiliary virtual topology for sub-path protection in WDM optical networks
Tema Archive | 2009|Keywords: Sicherheit -
High-Security Chaotic Cognitive Radio System With Subcarrier Shifting
Online Contents | 2015|Keywords: Computer security, high security, Security -
Interaction of cyclic ageing at high-rate and low temperatures and safety in lithium-ion batteries
Tema Archive | 2015|Keywords: Sicherheit -
Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value
Tema Archive | 2011|Keywords: Sicherheit -
On security of wireless sensor networks: a data authentication protocol using digital signature
Online Contents | 2016|Keywords: Security -
Optimization of the Event-Driven Emergency Load-Shedding Considering Transient Security and Stability Constraints
Online Contents | 2017|Keywords: Security, frequency security, voltage security -
Safety verification of non-linear hybrid systems is quasi-decidable
Online Contents | 2013|Keywords: Safety verification -
Secure Connectivity Solution "Cloaks" Power Facility Networks
Tema Archive | 2015|Keywords: Sicherheit, Cyber-Sicherheit -
An assessment on the quantification of hydrogen releases through oxygen displacement using oxygen sensors
Tema Archive | 2014|Keywords: Sicherheit -
OSHA, IEC Renew Alliance for Protecting Workers from Electrical Hazards
Online Contents | 2015Keywords: Occupational health and safety -
A collaborative routing protocol against routing disruptions in MANETs
Online Contents | 2012|Keywords: Network security -
Android platform-based individual privacy information protection system
Online Contents | 2016|Keywords: Information security -
From keyloggers to touchloggers: Take the rough with the smooth
Tema Archive | 2013|Keywords: Sicherheit -
The Cybersecurity Landscape in Industrial Control Systems
Online Contents | 2016|Keywords: Computer security, power system security, security -
The private security industry in Turkey: Officer characteristics and their perception of training sufficiency
Online Contents | 2013|Keywords: Security management, Security personnel -
ECASS: an encryption compression aggregation security scheme for secure data transmission in ambient assisted living systems
Online Contents | 2018|Keywords: Security -
Fuzzy security concepts for the Internet of the future
Online Contents | 2010|Keywords: High Security Level, Security Protocol -
New Hampshire Electrical Contractor Faces $40,000 in Fines After OSHA Spots Violations
Online Contents | 2015Keywords: Occupational health and safety -
Cyber situational awareness – A systematic review of the literature
Tema Archive | 2014|Keywords: Sicherheit -
Security management based on trust determination in cognitive radio networks
Tema Archive | 2014|Keywords: Sicherheit, Netzwerk-Security -
Klare Anforderungen an Safety und Security. Die Automatisierungstechnik muß sich der Herausforderung stellen
Tema Archive | 2013|Keywords: IT-Sicherheit, BSI (Bundesamt für Sicherheit in der Informationstechnik) -
Minimising the risk of cross-country faults in systems using arc suppression coils
Tema Archive | 2011|Keywords: elektrische Sicherheit -
Improved Security Proofs in Lattice-Based Cryptography: Using the Rényi Divergence Rather than the Statistical Distance
Online Contents | 2017|Keywords: Security proofs
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.