Year of publication
Type of media
Type of material
Licence
TIB reading rooms collection
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Efficient Zero-Knowledge Arguments and Digital Signatures via Sharing Conversion in the Head
Springer Verlag | 2024|Keywords: Systems and Data Security, Security Services, Mobile and Network Security -
The Role of Digital Trust in Enhancing Cyber Security Resilience
Springer Verlag | 2024|Keywords: Cyber security, Data security, Network security -
Quantum Computers—Security Threats and Solutions
Springer Verlag | 2024|Keywords: IT security, Security Science and Technology, Systems and Data Security -
Accessorize in the Dark: A Security Analysis of Near-Infrared Face Recognition
Springer Verlag | 2024|Keywords: Systems and Data Security, Security Services, Mobile and Network Security -
The Grant Negotiation and Authorization Protocol: Attacking, Fixing, and Verifying an Emerging Standard
Springer Verlag | 2024|Keywords: Systems and Data Security, Security Services, Mobile and Network Security -
DScope: To Reliably and Securely Acquire Live Data from Kernel-Compromised ARM Devices
Springer Verlag | 2024|Keywords: Systems and Data Security, Security Services, Mobile and Network Security -
Effects of Organizational Cyber Security Culture Across the Energy Sector Supply Chain
Springer Verlag | 2024|Keywords: Cyber security, Cyber security culture, Supply chain security, Supply chain cyber security, Mobile and Network Security, Systems and Data Security -
Assessing the Challenges Faced by Security Operations Centres (SOC)
Springer Verlag | 2024|Keywords: Cyber security, Security operations centre -
Security Flaw in TCP/IP and Proposed Measures
Springer Verlag | 2024|Keywords: Security, SMTP security issue, Systems and Data Security -
Spatial Data of Smart Cities: Trust
Springer Verlag | 2024|Keywords: Security, Systems and Data Security, Security Science and Technology -
Assessing the Effectiveness of UK Counter-Terrorism Strategies and Alternative Approaches
Springer Verlag | 2024|Keywords: National security, International security, Systems and Data Security, Crime Control and Security, Security Science and Technology -
Personalized Differential Privacy in the Shuffle Model
Springer Verlag | 2024|Keywords: Security Science and Technology, Security Services -
DZIP: A Data Deduplication-Compatible Enhanced Version of Gzip
Springer Verlag | 2024|Keywords: Security Science and Technology, Security Services -
Revolutionizing Military Technology: How the Fusion of BlockChain and Quantum Computing is Driving in Defense Application
Springer Verlag | 2024|Keywords: Security, National security, Mobile and Network Security, Security Services -
A New Approach to Efficient and Secure Fixed-Point Computation
Springer Verlag | 2024|Keywords: malicious security, covert security, Systems and Data Security, Security Services -
Integrated Physical Protection of Emergency Water Production Facilities
Springer Verlag | 2024|Keywords: Complex security system, Security Science and Technology, Systems and Data Security -
LEWRY Your Smart Home Security Robot
Springer Verlag | 2024|Keywords: Security, Home security Robot -
SSL-ABD : An Adversarial Defense Method Against Backdoor Attacks in Self-supervised Learning
Springer Verlag | 2024|Keywords: Security Science and Technology, Security Services -
Fuzzing Drone Control System Configurations Based on Quality-Diversity Enhanced Genetic Algorithm
Springer Verlag | 2024|Keywords: Drone security, Security Science and Technology, Security Services -
Toward Malicious Constant-Rate 2PC via Arithmetic Garbling
Springer Verlag | 2024|Keywords: Malicious security, Security Services, Mobile and Network Security -
Security Management Methods for Infocommunication Systems
Springer Verlag | 2024|Keywords: information security, security monitoring system, adaptive security management method -
Penetration Testing for the Cloud-Based Web Application
Springer Verlag | 2024|Keywords: Security testing, Cloud security, Web application security, Information security, Systems and Data Security -
Impacts of COVID on Cybersecurity
Springer Verlag | 2024|Keywords: IT security, Security Science and Technology, Systems and Data Security -
Security Challenges in IOT
Springer Verlag | 2024|Keywords: Security, Security architectures, Security Science and Technology, Mobile and Network Security -
The Use of Information Security Methods and Techniques in the Education of Software Engineers
Springer Verlag | 2024|Keywords: Information security, Security Science and Technology, Systems and Data Security -
Penetrating Machine Learning Servers via Exploiting BMC Vulnerability
Springer Verlag | 2024|Keywords: AI Security, Systems and Data Security, Mobile and Network Security -
The World in 2084
Springer Verlag | 2024|Keywords: Systems and Data Security, Principles and Models of Security -
Techniques and Tactics of Cyber Warfare
Springer Verlag | 2024|Keywords: Systems and Data Security, Principles and Models of Security -
New ASMS Architecture in the Mobile Agent System to Protect the Code and Data of an Agent
Springer Verlag | 2024|Keywords: Mobile agent security, Security policy -
The Shift of Powers, Borders, and Resources
Springer Verlag | 2024|Keywords: Systems and Data Security, Principles and Models of Security -
Stuxnet and the Poisoned Well: What Connects the Middle Ages with the Cyber World
Springer Verlag | 2024|Keywords: Systems and Data Security, Principles and Models of Security -
Mobile Applications Security: A Survey About Security Level and Awareness of Moroccan Users
Springer Verlag | 2024|Keywords: Security level, mobile application security -
A Modest Approach Toward Cloud Security Hygiene
Springer Verlag | 2024|Keywords: Security Management as a Service, Cloud security posture management, Cloud security, Systems and Data Security -
Two Models are Better Than One: Federated Learning is Not Private for Google GBoard Next Word Prediction
Springer Verlag | 2024|Keywords: Systems and Data Security, Security Services, Mobile and Network Security -
Runtime SoC Security Validation
Springer Verlag | 2024|Keywords: SoC security monitoring, Security vulnerabilities, Security assets, Security policies -
ConGISATA: A Framework for Continuous Gamified Information Security Awareness Training and Assessment
Springer Verlag | 2024|Keywords: Information Security Awareness, Systems and Data Security, Security Services, Mobile and Network Security -
“The End Justifies the Means” or: the Legacy of Carl von Clausewitz
Springer Verlag | 2024|Keywords: Systems and Data Security, Principles and Models of Security -
Exploring Some Possible Applications of DRM Drones
Springer Verlag | 2024|Keywords: Safety and security, Security Science and Technology, Systems and Data Security -
Securing 5G Positioning via Zero Trust Architecture
Springer Verlag | 2024|Keywords: Cyber Security, Security Science and Technology, Security Services -
New Rules for a New War
Springer Verlag | 2024|Keywords: Systems and Data Security, Principles and Models of Security -
Artificial Intelligence in Healthcare and Medical Records Security
Springer Verlag | 2024|Keywords: Medical record security, ML in data security, Crime Control and Security -
Big Data Analytics for Secure Edge-Based Manufacturing Internet of Things (MIoT)
Springer Verlag | 2024|Keywords: Security, Systems and Data Security, Security Science and Technology -
The Art of Cyber Warfare and the 13 Lessons of Sun Tzu
Springer Verlag | 2024|Keywords: Systems and Data Security, Principles and Models of Security -
Conversational AI
Introduction to Chatbot's Security Risks, Their Probable Solutions, and the Best Practices to FollowWiley | 2024|Keywords: chatbot security, security risks -
Propaganda—How it Worked in the Past and What it is Today
Springer Verlag | 2024|Keywords: Systems and Data Security, Principles and Models of Security -
Codes and Secret Messages: From the Ancient Origins of Steganography and Cryptography and their Relevance to Today
Springer Verlag | 2024|Keywords: Systems and Data Security, Principles and Models of Security -
SplITS: Split Input-to-State Mapping for Effective Firmware Fuzzing
Springer Verlag | 2024|Keywords: Systems and Data Security, Security Services, Mobile and Network Security -
Survival in Cyberspace: Strategies for Every Individual
Springer Verlag | 2024|Keywords: Systems and Data Security, Principles and Models of Security -
Fake News Detection Using Machine Learning
Springer Verlag | 2024|Keywords: Social security, National security, Cyber security, Systems and Data Security -
Introduction
Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution: Threats, Assessment and ResponsesSpringer Verlag | 2024|Keywords: National security, International security, Systems and Data Security, Crime Control and Security, Security Science and Technology
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.