Year of publication
Type of media
Source
Subject
Type of material
Language
Synonyms were used for: INFORMATION • NETWORK SECURITY • SECURITY
Search without synonyms: keywords:(INFORMATION NETWORK SECURITY)
Used synonyms:
- informationswesen
- mitteilung
Used synonyms:
- netzwerk security
- netzwerksicherheit
Used synonyms:
- safety
- sicherheit
-
A Botnets Circumspection: The Current Threat Landscape, and What We Know So Far
Free accessDOAJ | 2019|Keywords: cyber security, network security, information security, Information technology -
Co-governed Sovereignty Network : Legal Basis and Its Prototype & Applications with MIN Architecture
Catalogue medicine | 2021|Keywords: Computing & information technology, Network hardware, Network security -
Enterprise environment modeling for penetration testing on the OpenStack virtualization platform
Free accessDOAJ | 2021|Keywords: network modelling, information security, security testing -
Network awareness of security situation information security measurement method based on data mining
IOS Press | 2024|Keywords: information security, Network security situation -
Analysis of Security Mechanisms Based on Clusters IoT Environments
Free accessDOAJ | 2017|Keywords: Data Security, Information Technology, Network, Security -
Electronic Voting : 7th International Joint Conference, E-Vote-ID 2022, Bregenz, Austria, October 4-7, 2022, Proceedings
Catalogue medicine | 2022|Keywords: Computer security, Network security, Network hardware, Information retrieval -
Electronic Voting : 7th International Joint Conference, E-Vote-ID 2022, Bregenz, Austria, October 4-7, 2022, Proceedings
Free accessTIBKAT | 2022|Keywords: Computer security, Network security, Network hardware, Information retrieval -
Researching Internet Governance : Methods, Frameworks, Futures
Catalogue medicine | 2020|Keywords: Information technology: general issues, Network security -
Denial of service attack detection through machine learning for the IoT
Free accessDOAJ | 2020|Keywords: security, network security, Information technology -
Detecting Insider Threats: Solutions and Trends
Taylor & Francis Verlag | 2012|Keywords: operations security, Information security and risk management, telecommunications and network security threats -
Electronic Voting : 7th International Joint Conference, E-Vote-ID 2022, Bregenz, Austria, October 4-7, 2022, Proceedings
Free accessGWLB - Gottfried Wilhelm Leibniz Bibliothek | 2022|Keywords: Computer security, Network security, Network hardware, Information retrieval -
Real-Time Monitoring and Management of Hardware and Software Resources in Heterogeneous Computer Networks through an Integrated System Architecture
Free accessDOAJ | 2023|Keywords: network security, security monitoring, information security, computer security, data security -
ML-Based 5G Network Slicing Security: A Comprehensive Survey
Free accessDOAJ | 2022|Keywords: 5G network, network slicing, security, Information technology -
Development of a Cloud-based Network Teaching Platform
Free accessDOAJ | 2018|Keywords: network course, network security, Information technology -
SlowTT: A Slow Denial of Service against IoT Networks
Free accessDOAJ | 2020|Keywords: protocols security, cyber security, network security, Information technology -
SCADA System Testbed for Cybersecurity Research Using Machine Learning Approach
Free accessDOAJ | 2018|Keywords: network security, Information technology -
A distributed authentication and authorization scheme for in-network big data sharing
Free accessDOAJ | 2017|Keywords: Security, In-network data sharing, Information-centric network, Information technology -
Electronic Voting : 8th International Joint Conference, E-Vote-ID 2023, Luxembourg City, Luxembourg, October 3–6, 2023, Proceedings
Free accessTIBKAT | 2023|Keywords: Computer security, Information technology: general issues, Network security, Network hardware -
A Task of Multi-objective Selection of Network Security Systems in Accordance with Information Security Policies
Free accessDOAJ | 2015|Keywords: information security policy, network security system, Information technology, Information theory -
Methods for Selection of Network Security Systems in accordance with Information Security Policies
Free accessDOAJ | 2015|Keywords: information security policy, network security system, Information technology, Information theory
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.