Year of publication
Subject
Type of material
Licence
TIB reading rooms collection
LUH institutes collection
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Elementary Remarks on Some Quadratic Based Identity Based Encryption Schemes
Springer Verlag | 2024|Keywords: Systems and Data Security, Security Services, Mobile and Network Security -
BASS: Boolean Automorphisms Signature Scheme
Springer Verlag | 2024|Keywords: Systems and Data Security, Security Services, Mobile and Network Security -
Some Results on Related Key-IV Pairs of Espresso
Springer Verlag | 2024|Keywords: Systems and Data Security, Security Services, Mobile and Network Security -
Fake News Detection Using Machine Learning
Springer Verlag | 2024|Keywords: Social security, National security, Cyber security, Systems and Data Security -
Introduction
Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution: Threats, Assessment and ResponsesSpringer Verlag | 2024|Keywords: National security, International security, Systems and Data Security, Crime Control and Security, Security Science and Technology -
Pinky: A Modern Malware-Oriented Dynamic Information Retrieval Tool
Springer Verlag | 2024|Keywords: Systems and Data Security, Security Services, Mobile and Network Security -
Artificial Intelligence in Healthcare and Medical Records Security
Springer Verlag | 2024|Keywords: Medical record security, ML in data security, Crime Control and Security -
Big Data Analytics for Secure Edge-Based Manufacturing Internet of Things (MIoT)
Springer Verlag | 2024|Keywords: Security, Systems and Data Security, Security Science and Technology -
Per-user network access control kernel module with secure multifactor authentication
Springer Verlag | 2024|Keywords: Network security, Linux security module, Security key -
Non-IP Based Communication in IoT: Handling Security Challenges
Springer Verlag | 2024|Keywords: Security challenges, Security standards, Proactive security measures, Security Science and Technology, Mobile and Network Security -
OpenBSD Formal Driver Verification with SeL4
Springer Verlag | 2024|Keywords: Systems and Data Security, Security Services, Mobile and Network Security -
Hungarian Regulation of Personnel Entry Control to Nuclear Power Plant I
Springer Verlag | 2024|Keywords: Security fundamentals, Security Science and Technology, Systems and Data Security -
Optimizing SVM classification in medical datasets: A comparative study of swarm intelligence algorithms for feature selection and parameter tuning
American Institute of Physics | 2024|Keywords: ADVANCED HIGH-PERFORMANCE COMPUTING AND SECURITY -
Comparison of solar harvesting by using static and multi axis dynamic photovoltaic module
American Institute of Physics | 2024|Keywords: ADVANCED HIGH-PERFORMANCE COMPUTING AND SECURITY -
A standard ranking algorithm for robust iris template protection
Free accessBASE | 2024|Keywords: Security -
Analysis of deep learning methods for cybersecurity in industry 4.0
American Institute of Physics | 2024|Keywords: DATA ANALYSIS, INFORMATION SYSTEMS AND SECURITY -
A Holistic Approach for Trustworthy Distributed Systems with WebAssembly and TEEs
Free accessDataCite | 2024|Keywords: Security and privacy → Distributed systems security, Security and privacy → Trusted computing, Security and privacy -
Measurements and mapping of natural radioactivity in the city of najaf, Al-Najaf governorate (Iraq), by using track detector Cr-39 and geographical information system (GIS)
American Institute of Physics | 2024|Keywords: DATA ANALYSIS, INFORMATION SYSTEMS AND SECURITY -
Chaos based Medical Image Encryption Techniques: A Comprehensive Review and Analysis
Taylor & Francis Verlag | 2024|Keywords: security -
Analysis of multimedia network data security based on routing algorithm
IOS Press | 2024|Keywords: network data security -
Prediction of phase equilibria in ternary diagram for system consist of hot compressed water (HCW) with crude palm oil (CPO) and others minor component using thermodynamic model
American Institute of Physics | 2024|Keywords: ADVANCED HIGH-PERFORMANCE COMPUTING AND SECURITY -
Tell me who you are friends with and I will tell you who you are: Unique neighborhoods in random graphs
Elsevier | 2024|Keywords: Security -
A critical survey of the security and privacy aspects of the Aadhaar framework
Elsevier | 2024|Keywords: Security -
V2XCom: Lightweight and secure message dissemination scheme for Internet of vehicles
Wiley | 2024|Keywords: security attacks -
Analysis of modern security plugins for wordpress
American Institute of Physics | 2024|Keywords: DATA ANALYSIS, INFORMATION SYSTEMS AND SECURITY -
IoT Security in Industry: A Threat Model of Existing and Future Network Infrastructure
Taylor & Francis Verlag | 2024|Keywords: Security -
AR@campus: Augmented reality (AR) for indoor positioning and navigation apps
American Institute of Physics | 2024|Keywords: ADVANCED HIGH-PERFORMANCE COMPUTING AND SECURITY -
SECRET: A New SECurity REquirements SpecificaTion Template
Springer Verlag | 2024|Keywords: Security requirement, Security requirements engineering -
Fuzzy Cognitive Security Techniques for Data Aggregation in Capillary Networks
Springer Verlag | 2024|Keywords: Security, Systems and Data Security -
Study the Level of Network Security and Penetration Tests on Power Electronic Device
Free accessDOAJ | 2024|Keywords: cyber security, network security -
A Memorable Communication Method Based on Cryptographic Accumulator
Free accessDOAJ | 2024|Keywords: information security, endogenous security -
An Approach to Blockchain-Based E-Voting System Using Peer-To-Peer Protocol
Springer Verlag | 2024|Keywords: Security, Systems and Data Security -
Analysis of unikernel security with a focus on RustyHermit
DataCite | 2024|Keywords: Sicherheit, security -
Cyber Threat Analysis and Mitigation in Emerging Information Technology (IT) Trends
Springer Verlag | 2024|Keywords: Information Security, Cyber Security -
Exploring security and trust mechanisms in online social networks: An extensive review
Elsevier | 2024|Keywords: Security and trust, Security threats and solutions -
Hazard identification risk assessment and determining control for seismic aspects on site evaluation the nuclear power plant in West Kalimantan
American Institute of Physics | 2024|Keywords: NUCLEAR SAFETY AND RADIOMETROLOGY -
Risk assessment for aspects of population dispersion and distribution on site evaluation nuclear power plant in West Kalimantan
American Institute of Physics | 2024|Keywords: NUCLEAR SAFETY AND RADIOMETROLOGY -
Overview on GRS CFD activities related to containment applications
DeGruyter | 2024|Keywords: hydrogen safety -
Evaluation of security framework for BYOD device in cloud environment
Free accessDOAJ | 2024|Keywords: privacy and security, security manager (saas), data security -
DFaP: Data Filtering and Purification Against Backdoor Attacks
Springer Verlag | 2024|Keywords: AI security, Security Science and Technology, Security Services -
Efficient Wildcard Searchable Symmetric Encryption with Forward and Backward Security
Springer Verlag | 2024|Keywords: Forward and Backward Security, Security Science and Technology, Security Services -
Studie zur Bewertung von Algorithmen für nautische Anwendungen
DataCite | 2024|Keywords: Deep-Learning-Anwendungen, Sicherheit, Umweltschutz, Seeverkehr, Nautik, Schifffahrt -
Exploring the Current Landscape of Cyberterrorism: Insights, Strategies, and the Impact of COVID-19
Springer Verlag | 2024|Keywords: National security, Systems and Data Security, Crime Control and Security, Security Science and Technology -
Digital Security Controversy Analysis: A Case Study of the Debate over GCHQ Exceptional Access Proposal
Springer Verlag | 2024|Keywords: Digital Security Controversy, Security, Systems and Data Security -
Evaluating the Security of Open-Source Linux Operating Systems for Unmanned Aerial Vehicles
Springer Verlag | 2024|Keywords: Security threats, Security vulnerabilities, Security Science and Technology -
Innovative security solutions for information technology and communications : 16th international conference, SecITC 2023, Bucharest, Romania, November 23-24, 2023 : revised selected papers
TIBKAT | 2024|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.