Year of publication
Type of media
Source
Subject
- ‹ All subjects
- Electrical engineering (4,176)
- Medicine (1,016)
- Computer Science (601)
- Life Sciences (493)
- Physics (306)
- Horticulture (153)
- Mechanical engineering, energy technology (76)
- Educational Science (71)
- Social Sciences (71)
- Chemical and environmental engineering (56)
- Chemistry (52)
- Mathematics (44)
- Economics (41)
- Engineering (33)
- Traffic engineering (30)
- Architecture (17)
- Medical technology (12)
- Law (2)
- Other subjects (2)
Type of material
Licence
Language
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Security of Satellite-Terrestrial Communications: Challenges and Potential Solutions
Free accessDOAJ | 2022|Keywords: Security, network security, satellite security, communications security, NTN security -
Real-Time Monitoring and Management of Hardware and Software Resources in Heterogeneous Computer Networks through an Integrated System Architecture
Free accessDOAJ | 2023|Keywords: network security, security monitoring, information security, computer security, data security -
Design of a Symmetry Protocol for the Efficient Operation of IP Cameras in the IoT Environment
Free accessDOAJ | 2019|Keywords: IP camera security, NVR security, video security -
Dimensions of Health Security—A Conceptual Analysis
Free accessDOAJ | 2020|Keywords: cooperative security, health security, security for individuals -
When Agile Security Meets 5G
Free accessDOAJ | 2020|Keywords: 5G security, agile security, cloud security, security risk management -
A Survey of Public Key Infrastructure-Based Security for Mobile Communication Systems
Free accessDOAJ | 2016|Keywords: PKI security, mobile communication security, GSM-authentication and key agreement (AKA) security, CDMA-AKA security, long term evolution-authentication and key agreement (LTE-AKA) security -
An Intelligent Improvement of Internet-Wide Scan Engine for Fast Discovery of Vulnerable IoT Devices
Free accessDOAJ | 2018|Keywords: security, intelligent security -
A Survey on the Cyber Security of Small-to-Medium Businesses: Challenges, Research Focus and Recommendations
Free accessDOAJ | 2022|Keywords: Cyber security, security posture, cyber security threats, cyber security frameworks, security and privacy -
The Roadmap to 6G Security and Privacy
Free accessDOAJ | 2021|Keywords: security, security threats, AI/ML security, physical layer security -
WLAN Security: Threats And Countermeasures
Free accessDOAJ | 2018|Keywords: wifi security, wlan security, wireless security -
Hybrid Cipher for Secure Multimedia by using AES and RC4 Chain
Free accessDOAJ | 2017|Keywords: Multimedia Security; Security; AES; RC4 -
Hybrid Cipher for Secure Multimedia by using AES and RC4 Chain
Free accessDOAJ | 2017|Keywords: multimedia security; security; aes; rc4 -
Data-Driven Security for Smart City Systems: Carving a Trail
Free accessDOAJ | 2020|Keywords: data-driven security, security protection techniques, security policies, security management -
An Integrated Knowledge Graph to Automate Cloud Data Compliance
Free accessDOAJ | 2020|Keywords: cloud security, security domains, security compliance models, cloud security models -
Denial of service attack detection through machine learning for the IoT
Free accessDOAJ | 2020|Keywords: security, network security -
Factors Related to Cyber Security Behavior
Free accessDOAJ | 2020|Keywords: Cyber security, cyber security behaviours, cyber security breaches, cyber security perception -
Fuzzy-Based Symmetrical Multi-Criteria Decision-Making Procedure for Evaluating the Impact of Harmful Factors of Healthcare Information Security
Free accessDOAJ | 2020|Keywords: healthcare security, information security -
Developing Secure IoT Services: A Security-Oriented Review of IoT Platforms
Free accessDOAJ | 2018|Keywords: information security, IoT security -
Security Operations Center: A Systematic Study and Open Challenges
Free accessDOAJ | 2020|Keywords: Security management, security operations center, security operations -
Cyberattacks and Security of Cloud Computing: A Complete Guideline
Free accessDOAJ | 2023|Keywords: security threats, security attacks
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.