Year of publication
Type of media
Source
Subject
- ‹ All subjects
- Electrical engineering (22,181)
- Computer Science (6,212)
- Physics (2,583)
- Mechanical engineering, energy technology (1,228)
- Other subjects (771)
- Economics (644)
- Chemistry (643)
- Mathematics (638)
- Traffic engineering (622)
- Material science (256)
- Life Sciences (146)
- Medical technology (125)
- Chemical and environmental engineering (92)
- Civil engineering (81)
- Engineering (71)
- Mining (67)
- Architecture (29)
- Social Sciences (26)
- Earth Sciences (16)
- Medicine (15)
- Horticulture (9)
- Educational Science (9)
Type of material
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Enabling security functions with SDN: A feasibility study
Elsevier | 2015|Keywords: Network security, Software-defined networking security, SDN security -
Denial of service attack detection through machine learning for the IoT
Free accessTaylor & Francis Verlag | 2020|Keywords: security, network security -
Impact of static and dynamic load models on security margin estimation methods
Elsevier | 2021|Keywords: Dynamic security margins, Dynamic security limits, Security assessment, Security margin estimation -
Security and Privacy Service Level Agreement composition for Internet of Things systems on top of standard controls
Elsevier | 2022|Keywords: Cloud security, IoT security, Security and privacy, Security SLA -
A survey on registration hijacking attack consequences and protection for session initiation protocol (SIP)
Elsevier | 2020|Keywords: Network security, Sip security -
Apparatus: A framework for security analysis in internet of things systems
Elsevier | 2018|Keywords: IoT Security, Security requirements, Smart cities security -
Novel security models, metrics and security assessment for maritime vessel networks
Elsevier | 2021|Keywords: Security analysis, Security metrics, Security models -
Model-based evaluation of combinations of Shuffle and Diversity MTD techniques on the cloud
Elsevier | 2019|Keywords: Security analysis, Security metrics, Security modeling -
On the design of secure primitives for real world applications
Elsevier | 2020|Keywords: Hardware security, Systems security, Security engineering, Computers and networks security -
A framework and tool for the assessment of information security risk, the reduction of information security cost and the sustainability of information security culture
Online Contents | 2021|Keywords: Information security, Information security evaluation, The ARCS security framework, Information security culture, Information security assessment, Information security cost -
Physical unclonable functions based secret keys scheme for securing big data infrastructure communication
Elsevier | 2019|Keywords: IoT Security, Zigbee security, Hardware security -
The fast image encryption algorithm based on lifting scheme and chaos
Elsevier | 2020|Keywords: Information security, Security analysis -
Government regulations in cyber security: Framework, standards and recommendations
Elsevier | 2018|Keywords: Cyber security, Information security -
OSCAR: Object security architecture for the Internet of Things
Elsevier | 2014|Keywords: Communication security, Object security, End-to-end security -
Security of Satellite-Terrestrial Communications: Challenges and Potential Solutions
Free accessDOAJ | 2022|Keywords: Security, network security, satellite security, communications security, NTN security -
All-Or-Nothing data protection for ubiquitous communication: Challenges and perspectives
Elsevier | 2019|Keywords: Data security, Multimedia security -
Semantic security against web application attacks
Elsevier | 2013|Keywords: Application security, Semantic security -
Social network security: Issues, challenges, threats, and solutions
Elsevier | 2017|Keywords: Security and privacy, Security threats -
A machine-learning based probabilistic perspective on dynamic security assessment
Elsevier | 2020|Keywords: Security Rules, Dynamic Security Assessment, Probabilistic Security Assessment -
A Study on Acceptance Procedure Improvement of Web Application by Outsourcing for Mobile Service
Online Contents | 2016|Keywords: Security architecture, Information security, Security management -
Network security assessment using a semantic reasoning and graph based approach
Elsevier | 2017|Keywords: Network security, Security ontology -
Cyber security in the Smart Grid: Survey and challenges
Elsevier | 2012|Keywords: Cyber security, Security protocols -
MAPE-K/MAPE-SAC: An interaction framework for adaptive systems with security assurance cases
Elsevier | 2020|Keywords: Security assurance cases, Security certification -
A new unified image encryption algorithm based on a lifting transformation and chaos
Elsevier | 2020|Keywords: Information security, Security analysis -
Cloud security engineering: Early stages of SDLC
Elsevier | 2016|Keywords: Cloud security, Security vulnerabilities -
Swarm Intelligence inspired Intrusion Detection Systems — A systematic literature review
Elsevier | 2021|Keywords: Network security, Data security -
Hardware/software security co-verification and vulnerability detection: An information flow perspective
Elsevier | 2023|Keywords: Hardware and software security co-verification, Information flow security, Security model, Security property -
TARP: Ticket-based address resolution protocol
Elsevier | 2007|Keywords: Network security, ARP security -
Experimental Study to Analyze the Security Performance in Wireless LANs
Online Contents | 2015|Keywords: Security strength, Security protocols, WLAN security -
The area-efficient gate level information flow tracking schemes of digital circuit with multi-level security lattice
Elsevier | 2023|Keywords: Hardware security, Security lattice, Security label -
Metaverse intrusion detection of wormhole attacks based on a novel statistical mechanism
Elsevier | 2023|Keywords: IoT security, Network security, Mobile cloud security, Security for Metaverse, Virtualization security, Cyber-Physical security -
A Study on Financing Security for Smartphones Using Text Mining
Online Contents | 2017|Keywords: Smartphone security, Security, Smartphone financing security -
An architecture to manage security operations for digital service chains
Elsevier | 2020|Keywords: Cyber-security paradigms, Security architectures -
Critical analysis of the layered and systematic approaches for understanding IoT security threats and challenges
Elsevier | 2022|Keywords: IoT security, IoT ecosystem security, Security requirements -
Cloud Security Threats and Solutions: A Survey
Online Contents | 2022|Keywords: Security techniques, Cyber-security, Cloud security and threats -
Systematic survey of advanced metering infrastructure security: Vulnerabilities, attacks, countermeasures, and future vision
Elsevier | 2022|Keywords: Security vulnerability, Security threat, Security attack -
Speculations on the science of web user security
Elsevier | 2012|Keywords: Web user security, Security science, Cyber security -
Indonesia Cyber Security : Urgency To Establish Cyber Army In The Middle Of Global Terrorist Threat
Free accessDOAJ | 2018|Keywords: cyber security, national security, human security -
A Composite Security Index for On-line Steady-state Security Evaluation
Taylor & Francis Verlag | 2011|Keywords: power system security, bus voltage security index, line flow security index, composite security index -
Integration of VANET and 5G Security: A review of design and implementation issues
Elsevier | 2019|Keywords: Security, VANET security standards -
A sentence-level text adversarial attack algorithm against IIoT based smart grid
Elsevier | 2021|Keywords: IIoT security, Smart grid security -
Probabilistic yoking proofs for large scale IoT systems
Elsevier | 2015|Keywords: RFID security, IoT security -
Efficient compressed sensing-based security approach for video surveillance application in wireless multimedia sensor networks
Elsevier | 2017|Keywords: Security, Security keys -
On the Security of A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing
Online Contents | 2021|Keywords: Security protocol, Information security -
Diagnostics of an output interface of a safety-related system with safety PLC
Online Contents | 2017|Keywords: Safety PLC, Safety integrity, Safety function -
Analysis of the physical layer security enhancing of wireless communication system under the random mobile
Free accessIET | 2019|Keywords: system security, physical layer security research, random mobile user physical layer security model, security of data, telecommunication security, artificial noise security scheme, physical layer security performance, physical layer security enhancing -
A Framework for Translating a High Level Security Policy into Low Level Security Mechanisms
Online Contents | 2010|Keywords: security policy, security mangement, network security, security modeling -
On usage control for GRID systems
Elsevier | 2009|Keywords: Security policies, Grid security, Distributed systems security -
A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks
Elsevier | 2015|Keywords: Security Attacks -
Security challenges with network functions virtualization
Elsevier | 2016|Keywords: Network security, Security threats
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.