Year of publication
Subject
Type of material
Licence
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Denial of service attack detection through machine learning for the IoT
Free accessTaylor & Francis Verlag | 2020|Keywords: security, network security -
The national security field under conditions of armed aggression of the Russian Federation against Ukraine in 2022
Free accessDOAJ | 2022|Keywords: security, security space, international (global) security, national security, military security, information security -
Asphaleia : die Entwicklung der Sicherheitsvorstellungen und der Diskurs über Sicherheit im archaischen und klassischen Griechenland
Free accessTIBKAT | 2018|Keywords: Sicherheit -
Security of Satellite-Terrestrial Communications: Challenges and Potential Solutions
Free accessDOAJ | 2022|Keywords: Security, network security, satellite security, communications security, NTN security -
Swoistość terminologii stosowanej w naukach o bezpieczeństwie
Free accessDOAJ | 2019|Keywords: security studies, theory of security, security terminology, security doctrine -
An architecture to manage security operations for digital service chains
Free accessBASE | 2021|Keywords: Cyber-security paradigm, Security architecture -
An architecture to manage security operations for digital service chains
Free accessBASE | 2020|Keywords: cyber-security paradigms, security architectures -
Analysis of the physical layer security enhancing of wireless communication system under the random mobile
Free accessIET | 2019|Keywords: system security, physical layer security research, random mobile user physical layer security model, security of data, telecommunication security, artificial noise security scheme, physical layer security performance, physical layer security enhancing -
Analysis of the physical layer security enhancing of wireless communication system under the random mobile
Free accessWiley | 2019|Keywords: physical layer security research, artificial noise security scheme, physical layer security performance, security of data, system security, random mobile user physical layer security model, telecommunication security, physical layer security enhancing -
When Agile Security Meets 5G
Free accessDOAJ | 2020|Keywords: 5G security, agile security, cloud security, security risk management -
Thinking multiculturality in the age of hybrid threats: Converging cyber and physical security in Akkuyu nuclear power plant
Free accessDOAJ | 2022|Keywords: Nuclear security, Security culture, Nuclear security culture, Cyber-physical security -
Globalization and treats to national security
Free accessDOAJ | 2017|Keywords: national security, economic security, information security -
Multimodal layer surveillance map based on anomaly detection using multi‐agents for smart city security
Free accessWiley | 2022|Keywords: smart‐city security, security robot -
AutoSecSDNDemo: Demonstration of automated end-to-end security in software-defined networks
Free accessFraunhofer Publica | 2016|Keywords: SDN security, end-to-end security, network security -
The intersection of social protection and mobilities: a move towards a ‘Practical Utopia’ research agenda
Free accessTaylor & Francis Verlag | 2018|Keywords: Social security, migration-security nexus -
Factors influencing the performance of safety programmes in the Ghanaian construction industry
Free accessDOAJ | 2018|Keywords: Safety performance, safety programmes, safety elements -
Security Technologies and Methods for Advanced Cyber Threat Intelligence, Detection and Mitigation
Free accessGWLB - Gottfried Wilhelm Leibniz Bibliothek | 2022|Keywords: Computer security -
Lightweight Cryptographic Techniques and Cybersecurity Approaches
Free accessTIBKAT | 2022|Keywords: Network security -
A Feminist Analysis of Security in Turkey
Free accessDOAJ | 2021|Keywords: feminist security studies, national security, social security -
A Survey on the Cyber Security of Small-to-Medium Businesses: Challenges, Research Focus and Recommendations
Free accessDOAJ | 2022|Keywords: Cyber security, security posture, cyber security threats, cyber security frameworks, security and privacy
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.