Year of publication
Type of media
Source
Type of material
Licence
Language
1–20 of 51 hits
Sort by:
Sort by:
-
VeReMi: a dataset for comparable evaluation of misbehavior detection in VANETs
Free accessDataCite | 2018|Keywords: Intrusion detection systems (Computer security) -
Terrorist fraud resistance of distance bounding protocols employing physical unclonable functions
Free accessDataCite | 2016|Keywords: Computer security -
Systematische Security-Tests von Kraftfahrzeugen
Free accessDataCite | 2019|Keywords: Penetration testing (Computer security), Computer security; Testing -
Symbiotic Interaction 5th International Workshop, Symbiotic 2016, Padua, Italy, September 29–30, 2016, Revised Selected Papers
Free accessBASE | 2017|Keywords: Computer security -
Semantic validation of affinity constrained service function chain requests
Free accessBASE | 2016|Keywords: Computer security -
Security in online learning assessment towards an effective trustworthiness approach to support e-learning teams
Free accessBASE | 2014|Keywords: Computer security -
Securely-entrusted multi-topology routing for community networks
Free accessBASE | 2016|Keywords: Computer security -
Secure auditing and data deduplication in the cloud
Free accessBASE | 2020|Keywords: Computer security -
Secrecy included : confidentiality enforcement for machine code
Free accessDataCite | 2022|Keywords: computer security -
RTMI 11 - Proceedings of the Third Seminar "Research Trends in Media Informatics"
Free accessDataCite | 2011Keywords: Computer security -
RTMI ´12 - Proceedings of the 4th Seminar on Research Trends in Media Informatics
Free accessDataCite | 2012Keywords: Computer security -
Remembering correctly: A market opportunity analysis for a new forensic technology
Free accessBASE | 2010|Keywords: Computer security -
PKIX Certificate Status in Hybrid MANETs
Free accessBASE | 2009|Keywords: Public key infrastructure (Computer security) -
New considerations about the correct design of turbo fingerprinting codes
Free accessBASE | 2008|Keywords: Computer security -
Misbehavior detection in cooperative intelligent transport systems
Free accessDataCite | 2018|Keywords: Anomaly detection (Computer security) -
MERCAT: A metric for the evaluation and reconsideration of certificate authority trustworthiness
Free accessDataCite | 2019|Keywords: Computer security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions:
full data search
or
title and abstract search
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
TIB AV portal
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
Specialised Information Service for Mobility and Transport Research (FID move)
Open Research Knowledge Graph (ORKG)
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Common Union Catalogue (GVK)
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.