Year of publication
Type of media
Source
Subject
Type of material
Licence
Language
Synonyms were used for: Sicherheitsanalyse
Search without synonyms: keywords:(Sicherheitsanalyse)
Used synonyms:
- security analysis
- security monitoring
-
Activity Learning as a Foundation for Security Monitoring in Smart Homes
Free accessDOAJ | 2017|Keywords: security monitoring -
Simple, Near-Optimal Quantum Protocols for Die-Rolling
Free accessDOAJ | 2017|Keywords: security analysis -
Key Concepts of Systemological Approach to CPS Adaptive Information Security Monitoring
Free accessDOAJ | 2021|Keywords: information security monitoring -
Protecting and Securing Sensitive Data in a Big Data Using Encryption
Free accessDOAJ | 2020|Keywords: real-time security monitoring -
Signal Processing for Time Domain Wavelengths of Ultra-Weak FBGs Array in Perimeter Security Monitoring Based on Spark Streaming
Free accessDOAJ | 2018|Keywords: perimeter security monitoring -
Cybersecurity in Supply Chain Systems: The Farm-to-Fork Use Case
Free accessDOAJ | 2024|Keywords: security monitoring -
IMLADS: Intelligent Maintenance and Lightweight Anomaly Detection System for Internet of Things
Free accessDOAJ | 2019|Keywords: system security monitoring -
A Comprehensive Attack Flow Model and Security Analysis for Wi-Fi and WPA3
Free accessDOAJ | 2018|Keywords: security analysis -
Research and application of nuclear fuel embedded intelligent security monitoring technology
Free accessDOAJ | 2022|Keywords: Security monitoring -
Construction of S-Box Based on Chaotic Map and Algebraic Structures
Free accessDOAJ | 2019|Keywords: security analysis -
Underlying Security Transmission Design for Orthogonal Time Frequency Space (OTFS) Modulation
Free accessDOAJ | 2022|Keywords: security analysis -
Instance Segmentation of Irregular Deformable Objects for Power Operation Monitoring Based on Multi-Instance Relation Weighting Module
Free accessDOAJ | 2023|Keywords: security monitoring -
Simulation of Attacks for Security in Wireless Sensor Network
Free accessDOAJ | 2016|Keywords: security analysis -
RDClass: on using relative distance of keywords for accurate network traffic classification
Free accessDOAJ | 2018|Keywords: security monitoring -
Image encryption using 3D Logistic-Sine cascade map
Free accessDOAJ | 2020|Keywords: security analysis -
An Embedded-technology-based Security Monitoring System Design of Intelligent Building
Free accessDOAJ | 2013|Keywords: Security monitoring -
Development of real time method of detecting attacks based on artificial intelligence
Free accessDOAJ | 2016|Keywords: security monitoring system -
CloudVMI: A Cloud-Oriented Writable Virtual Machine Introspection
Free accessDOAJ | 2017|Keywords: security monitoring -
Towards the Security Analysis of the Five Most Prominent IPv4aaS Technologies
Free accessDOAJ | 2020|Keywords: security analysis -
Attack Graph Utilization for Wastewater Treatment Plant
Free accessDOAJ | 2022|Keywords: security analysis
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.