Year of publication
Type of media
Subject
Type of material
Licence
1–20 of 4,175 hits
Sort by:
Sort by:
-
Cyber-Sicherheit für kritische Energieinfrastrukturen : Handlungsempfehlungen zur Umsetzung einer Zero-Trust-Architektur
Free accessDataCite | 2023|Keywords: Cyber-Sicherheit -
Identifikation auslösender Umstände von SOTIF-Gefährdungen durch systemtheoretische Prozessanalyse
DeGruyter | 2023|Keywords: Sicherheit der beabsichtigten Funktionalität -
Transformation in substation automation: Cyber-Resilient Digital Substations (CyReDS) in power grids
Free accessDeGruyter | 2023|Keywords: IT-Sicherheit -
Towards automated risk assessments for modular manufacturing systems
DeGruyter | 2023|Keywords: Sicherheit -
Der Wandel von Vertrauen in eine digitale Identität? – Einblicke in eine Nutzerstudie
Free accessSpringer Verlag | 2023|Keywords: Benutzbare Sicherheit -
Cyber-Sicherheit für kritische Energieinfrastrukturen – Handlungsempfehlungen zur Umsetzung einer Zero-Trust-Architektur
Free accessSpringer Verlag | 2023|Keywords: Cyber-Sicherheit -
Konzepte für sichere wallets in dezentralen Identitätsökosystemen
Free accessSpringer Verlag | 2023|Keywords: Hardwaregestützte Sicherheit -
IT-Sicherheit und Compliance in heterogenen Cloud Umgebungen—Compliance-as-Code als Schlüssel zur Umsetzung regulatorischer Anforderungen
Springer Verlag | 2023|Keywords: Cloud Sicherheit -
Correction to: A decentralized honeypot for IoT Protocols based on Android devices
Online Contents | 2022|Keywords: Sicherheit -
A decentralized honeypot for IoT Protocols based on Android devices
Online Contents | 2022|Keywords: Sicherheit -
Gridchain: an investigation of privacy for the future local distribution grid
Free accessOnline Contents | 2022|Keywords: Sicherheit -
Defeating traffic analysis via differential privacy: a case study on streaming traffic
Online Contents | 2022|Keywords: Sicherheit -
Are chrome extensions compliant with the spirit of least privilege?
Free accessOnline Contents | 2022|Keywords: Sicherheit -
Algorithm substitution attacks against receivers
Free accessOnline Contents | 2022|Keywords: Sicherheit -
Malicious code detection in android: the role of sequence characteristics and disassembling methods
Free accessOnline Contents | 2022|Keywords: Sicherheit -
Intrusion detection system over real-time data traffic using machine learning methods with feature selection approaches
Online Contents | 2022|Keywords: Sicherheit -
Automation of maritime shipping for more safety and environmental protection
DeGruyter | 2022|Keywords: Sicherheit im Seeverkehr -
A first look at references from the dark to the surface web world: a case study in Tor
Online Contents | 2022|Keywords: Sicherheit
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions:
full data search
or
title and abstract search
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
TIB AV portal
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
Specialised Information Service for Mobility and Transport Research (FID move)
Open Research Knowledge Graph (ORKG)
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Common Union Catalogue (GVK)
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.