Year of publication
Type of media
Source
Subject
- ‹ All subjects
- Educational Science (47,238)
- Computer Science (39,631)
- Electrical engineering (12,078)
- Mathematics (1,522)
- Economics (1,516)
- Social Sciences (966)
- Engineering (948)
- Physics (514)
- Traffic engineering (305)
- Mechanical engineering, energy technology (227)
- Law (159)
- Chemical and environmental engineering (140)
- Other subjects (98)
- Medicine (96)
- Chemistry (80)
- Civil engineering (51)
- Horticulture (50)
- Life Sciences (45)
- Medical technology (39)
- Material science (37)
- Architecture (31)
- Linguistics (27)
- Earth Sciences (22)
- History (17)
- Philosophy (5)
- Sports Science (4)
- Mining (3)
- Literature Studies (3)
- Study of religions (2)
Type of material
Language
TIB reading rooms collection
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Interactional Freedom and Cybersecurity
Springer Verlag | 2023|Keywords: Democratic security, Dictatorial security, Beautiful security, Invisible Security, Explainable Security, Systems and Data Security -
Role of Explainable AI in 6G Security*
Wiley | 2023|Keywords: explainable security, AI security, 6G security, security of XAI -
State of Art of Security and Risk in Wireless Environment Along with Healthcare Case Study
Wiley | 2023|Keywords: cyber security, security attacks, security models, security & privacy -
Security Infrastructure for Cyber Attack Targeted Networks and Services
Springer Verlag | 2022|Keywords: Security and protection, Network security, Server security, Cloud security, Device security, Security services, Infrastructure security -
Blockchain‐Based Security Solutions for IoT Systems
Wiley | 2018|Keywords: IoT security, security architecture, network security -
Why Do I Put Myself and Others in Danger or Help Increase Safety? Person‐ and Situation‐Related Causes of Safety Behaviours
Wiley | 2017|Keywords: safety leadership, safety motivation, team safety, safety climate, safety performance, safety rules -
Security from Legacy Wireless Systems to 5G Networks
Wiley | 2024|Keywords: security attacks, security services, wireless network security, wireless security architectures -
Software Defined Mobile Network Security
Wiley | 2015|Keywords: Security, Mobile network security, Security architecture -
Top Threats to Cloud: A Three-Dimensional Model of Cloud Security Assurance
Springer Verlag | 2021|Keywords: Cloud security model, Cloud security requirements, Cloud security threats, Cloud security vulnerabilities, Cloud security solution -
Physical Layer Security for UAV Communications
Wiley | 2020|Keywords: wireless network security, physical layer security, security breaches -
Tips for Consumers: How to Travel Safely on the Information Superhighway
Springer Verlag | 2019|Keywords: Systems and Data Security, Crime Control and Security, Security Science and Technology, Security Services, Mobile and Network Security -
A Systematic Mapping Study on Security Requirements Engineering Frameworks for Cyber-Physical Systems
Springer Verlag | 2018|Keywords: Security requirements, Security requirements engineering, Security requirements engineering frameworks, Security goal, Security -
Approximate Computing and Its Application to Hardware Security
Springer Verlag | 2018|Keywords: Security, Crime Control and Security, Security Science and Technology -
Time-Delay Attacks in Network Systems
Springer Verlag | 2018|Keywords: Security, Crime Control and Security, Security Science and Technology -
Hierarchical Identity-Based Encryption with Tight Multi-challenge Security
Springer Verlag | 2020|Keywords: Tight security, Multi-challenge security, Chosen-ciphertext security, Security Services, Mobile and Network Security -
Rebooting IT Security Awareness – How Organisations Can Encourage and Sustain Secure Behaviours
Free accessSpringer Verlag | 2023|Keywords: Security learning curve, Security awareness, Security training, IT-security for IT professionals, Organisational security, Human factors in IT security, Systems and Data Security, Mobile and Network Security -
Application-Layer Security for the WoT: Extending CoAP to Support End-to-End Message Security for Internet-Integrated Sensing Applications
Springer Verlag | 2013|Keywords: CoAP security, end-to-end application-layer security, message security, granular security, Systems and Data Security -
Gamification Techniques for Raising Cyber Security Awareness
Springer Verlag | 2019|Keywords: Security awareness, Usable security, Human-centered cyber security, Systems and Data Security, Security Services
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.