Year of publication
Subject
Type of material
Licence
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Denial of service attack detection through machine learning for the IoT
Free accessTaylor & Francis Verlag | 2020|Keywords: security, network security -
Real-Time Monitoring and Management of Hardware and Software Resources in Heterogeneous Computer Networks through an Integrated System Architecture
Free accessDOAJ | 2023|Keywords: network security, security monitoring, information security, computer security, data security -
Some aspects of internal security policy as an element of the national security strategy of the Republic of Serbia
Free accessDOAJ | 2017|Keywords: security, internal security, national security strategy, national security policy, internal security policy -
PROSEC TEST FOR THRIVE PROTECTIVE SECURITY RULES AGAINST THREATS, RISKS AND VULNERABILITIES
Free accessDOAJ | 2023|Keywords: security rules, security responsibilities, information security, security education -
Security of Satellite-Terrestrial Communications: Challenges and Potential Solutions
Free accessDOAJ | 2022|Keywords: Security, network security, satellite security, communications security, NTN security -
Design of a Symmetry Protocol for the Efficient Operation of IP Cameras in the IoT Environment
Free accessDOAJ | 2019|Keywords: IP camera security, NVR security, video security -
Geopolitical aspects of energy security and environmental security in the Republic of Serbia
Free accessDOAJ | 2020|Keywords: security, energy security, environmental security -
A contribution to definition of the concept of security in legal theory
Free accessDOAJ | 2014|Keywords: security, security bodies, individual security, international security, global security -
Some aspects of security culture in information technologies
Free accessDOAJ | 2023|Keywords: security, security culture, security culture in information technologies, information security culture -
Analysis of the physical layer security enhancing of wireless communication system under the random mobile
Free accessIET | 2019|Keywords: system security, physical layer security research, random mobile user physical layer security model, security of data, telecommunication security, artificial noise security scheme, physical layer security performance, physical layer security enhancing -
When Agile Security Meets 5G
Free accessDOAJ | 2020|Keywords: 5G security, agile security, cloud security, security risk management -
Analysis of the physical layer security enhancing of wireless communication system under the random mobile
Free accessWiley | 2019|Keywords: physical layer security research, artificial noise security scheme, physical layer security performance, security of data, system security, random mobile user physical layer security model, telecommunication security, physical layer security enhancing -
Still agreeing to disagree: international security and constructive ambiguity
Free accessTaylor & Francis Verlag | 2021|Keywords: UN Security Council resolutions, security -
Multimodal layer surveillance map based on anomaly detection using multi‐agents for smart city security
Free accessWiley | 2022|Keywords: smart‐city security, security robot -
AutoSecSDNDemo: Demonstration of automated end-to-end security in software-defined networks
Free accessFraunhofer Publica | 2016|Keywords: SDN security, end-to-end security, network security -
Some controversy about law on private security
Free accessDOAJ | 2014|Keywords: security, private security, security plan -
A Survey on the Cyber Security of Small-to-Medium Businesses: Challenges, Research Focus and Recommendations
Free accessDOAJ | 2022|Keywords: Cyber security, security posture, cyber security threats, cyber security frameworks, security and privacy -
A Survey of Public Key Infrastructure-Based Security for Mobile Communication Systems
Free accessDOAJ | 2016|Keywords: PKI security, mobile communication security, GSM-authentication and key agreement (AKA) security, CDMA-AKA security, long term evolution-authentication and key agreement (LTE-AKA) security -
Lightweight Cryptographic Techniques and Cybersecurity Approaches
Free accessGWLB - Gottfried Wilhelm Leibniz Bibliothek | 2022|Keywords: Network security -
Lightweight Cryptographic Techniques and Cybersecurity Approaches
Free accessTIBKAT | 2022|Keywords: Network security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.