Year of publication
Type of media
Source
Subject
- ‹ All subjects
- Computer Science (172,663)
- Educational Science (34,387)
- Electrical engineering (17,665)
- Earth Sciences (14,366)
- Mathematics (10,835)
- Social Sciences (8,663)
- Engineering (7,522)
- Economics (7,086)
- Mining (6,301)
- History (5,494)
- Chemical and environmental engineering (3,137)
- Physics (3,000)
- Mechanical engineering, energy technology (1,969)
- Civil engineering (1,766)
- Traffic engineering (1,627)
- Other subjects (1,346)
- Law (1,070)
- Chemistry (902)
- Architecture (777)
- Medicine (545)
- Life Sciences (256)
- Medical technology (253)
- Horticulture (142)
- Material science (125)
- Linguistics (50)
- Literature Studies (49)
- Philosophy (42)
- Sports Science (9)
- Study of religions (4)
Type of material
Licence
TIB reading rooms collection
LUH institutes collection
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
A Survey on Systems Security Metrics
Online Contents | 2017|Keywords: quantitative security, Security metrics, security foundation, security measurement -
Practical Covertly Secure MPC for Dishonest Majority - Or: Breaking the SPDZ Limits
Tema Archive | 2013|Keywords: Sicherheit, aktive Sicherheit, beweisbare Sicherheit -
Novel efficient techniques for real-time cloud security assessment
Elsevier | 2016|Keywords: Cloud security, Security quantification, Security evaluation, Security level agreements, Security metrics -
Cyber ranges and security testbeds: Scenarios, functions, tools and architecture
Elsevier | 2019|Keywords: Security testbed, Cyber security, Security exercise -
Security threats to critical infrastructure: the human factor
Free accessOnline Contents | 2018|Keywords: Security awareness, Cyber security training, Security threats against critical infrastructure, Critical infrastructure security, Work-based security training -
The design of phishing studies: Challenges for researchers
Elsevier | 2015|Keywords: Information security, Security behaviours, Email security, Security training -
The Human Aspects of Information Security Questionnaire (HAIS-Q): Two further validation studies
Elsevier | 2017|Keywords: Information security (InfoSec), Security behaviours, Cyber security, Information security awareness (ISA) -
Enabling security functions with SDN: A feasibility study
Elsevier | 2015|Keywords: Network security, Software-defined networking security, SDN security -
From information security to cyber security
Elsevier | 2013|Keywords: Information security, Cyber security, Cyber-Security, Computer security -
The significance of securing as a critical component of information security: An Australian narrative
Elsevier | 2019|Keywords: Security studies, Usable security, Information security messaging, Ontological security, Information security management -
A comprehensive model of information security factors for decision-makers
Elsevier | 2020|Keywords: Key Security Indicators, Security Success, Security Model, Security Management Decision-Making -
Security-related behavior in using information systems in the workplace: A review and synthesis
Elsevier | 2012|Keywords: Information security, Security-related behavior, Security assurance behavior, Security risk-taking behavior, Security damaging behavior, Security violation -
A novel Security-by-Design methodology: Modeling and assessing security by SLAs with a quantitative approach
Elsevier | 2020|Keywords: Security-by-Design methodologies, Security Service Level Agreement, Security metrics, Security models, Security Assessment -
“Security begins at home”: Determinants of home computer and mobile device security behavior
Elsevier | 2017|Keywords: Behavioral IS security, Information security, Mobile device security, Home computer security -
Security of Software Defined Networks: A survey
Elsevier | 2015|Keywords: Security, Software Defined Security, Network security -
Security threats to critical infrastructure: the human factor
Online Contents | 2018|Keywords: Security awareness, Cyber security training, Security threats against critical infrastructure, Critical infrastructure security, Work-based security training -
More than the individual: Examining the relationship between culture and Information Security Awareness
Elsevier | 2019|Keywords: Security culture, Information Security Awareness (ISA), Information Security (InfoSec), Cyber security -
Cloud security issues and challenges: A survey
Elsevier | 2016|Keywords: Cloud security, Cloud security challenges, Cloud security issues -
The prospects of easier security for small organisations and consumers
Elsevier | 2015|Keywords: Data security, Information security, Baseline security, Security profile -
The legal issues of the substantiation of new types of national security
Free accessDOAJ | 2020|Keywords: security, national security, national security strategy, types of national security, moral security, cultural security -
Security in agile software development: A practitioner survey
Elsevier | 2020|Keywords: Security engineering, Software security, Security standards, Security assurance -
Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q)
Elsevier | 2013|Keywords: Information security, Security behaviours, Cyber security -
Information security policy noncompliance: An integrative social influence model
Wiley | 2020|Keywords: information security management, IS Security, security policy violation -
Determinants of early conformance with information security policies
Elsevier | 2017|Keywords: Information security, Perceived security threat, Mandatory security policies, Information security awareness -
Security in Software-Defined Networking: Threats and Countermeasures
Online Contents | 2016|Keywords: Security countermeasures, Security -
Prevention is better than cure! Designing information security awareness programs to overcome users' non-compliance with information security policies in banks
Elsevier | 2017|Keywords: Information security awareness, Information security awareness programs, Information security compliance, Information security policy -
The nature of security: A conceptual framework for integral-comprehensive modeling of IT security and cybersecurity
Elsevier | 2022|Keywords: Information security, Security framework, Security architecture, Security model, Security relationship, Security chain -
Survey on cyberspace security
Online Contents | 2015|Keywords: information security, information system security, cyberspace security, network security, information content security -
A standard for developing secure mobile applications
Elsevier | 2013|Keywords: Mobile device security, Mobile application security, Application security, Cyber security -
Apparatus: A framework for security analysis in internet of things systems
Elsevier | 2018|Keywords: IoT Security, Security requirements, Smart cities security -
Incident response teams – Challenges in supporting the organisational security function
Elsevier | 2012|Keywords: Information security, Security management, Security models, Security learning -
A study on security strategy in ICT convergence environment
Online Contents | 2014|Keywords: Security advancement step, Security level, Security characteristic, Security strategy -
Information security assessment in public administration
Elsevier | 2019|Keywords: Information security, Information security assessment, Information security management -
Information security policies’ compliance: a perspective for higher education institutions
Taylor & Francis Verlag | 2020|Keywords: Information security policies’ compliance, information security culture, information security management, information security awareness, computer and information systems security -
College students information security awareness: a comparison between smartphones and computers
Online Contents | 2020|Keywords: Computer security, Smartphone information security awareness, Information security awareness, Information security knowledge -
Model-based specification of safety compliance needs for critical systems: A holistic generic metamodel
Elsevier | 2015|Keywords: Safety-critical system, Safety standard, Safety compliance, Safety assurance, Safety certification -
Denial of service attack detection through machine learning for the IoT
Free accessTaylor & Francis Verlag | 2020|Keywords: security, network security -
Future directions for behavioral information security research
Elsevier | 2012|Keywords: Information security, Behavioral information security, Deviant security behavior -
Information security policy development and implementation: The what, how and who
Elsevier | 2016|Keywords: Security policy development, Security policy implementation, Security policy life cycle, Security policy management -
Delegate the smartphone user? Security awareness in smartphone platforms
Elsevier | 2012|Keywords: Security awareness, Security survey, Smartphone security -
Information security: The moving target
Elsevier | 2008|Keywords: Information security, Information security topics, Information security trends, Security breaches, Security journals -
Information Security and People: A Conundrum for Compliance
Free accessBASE | 2017|Keywords: security compliance, security management, end user security behaviour -
A situation awareness model for information security risk management
Elsevier | 2014|Keywords: Information security management, Information security risk management, Information security intelligence, Information security compliance, Information security investigation, Evidence-based information security -
Cyber Security Challenges & Their Solutions in India
Free accessBASE | 2022|Keywords: security systems, cyber security, security tools -
Security policies definition and enforcement utilizing policy control function framework in 5G
Elsevier | 2021|Keywords: Security, Security enforcement, Security policies, Security analytics, Security assurance -
Security and Privacy Service Level Agreement composition for Internet of Things systems on top of standard controls
Elsevier | 2022|Keywords: Cloud security, IoT security, Security and privacy, Security SLA -
A unified framework for cloud security transparency and audit
Elsevier | 2020|Keywords: Security audit, Cloud security transparency, Security requirements -
Masking Proofs are Tight and How to Exploit it in Security Evaluations
Free accessBASE | 2018|Keywords: Security level, Security evaluation -
Ontology for attack detection: An intelligent approach to web application security
Elsevier | 2014|Keywords: Web application security, Semantic security, Cyber security, Information security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.