Year of publication
Type of media
Subject
Type of material
Licence
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Bayesian Stackelberg games for cyber-security decision support
Elsevier | 2021|Keywords: Cyber-security, Security games, Security investment -
On the design of secure primitives for real world applications
Elsevier | 2020|Keywords: Hardware security, Systems security, Security engineering, Computers and networks security -
Securing state reconstruction under sensor and actuator attacks: Theory and design
Elsevier | 2020|Keywords: Cyber–physical security, Security monitoring -
CAAVI-RICS model for observing the security of distributed IoT and edge computing systems
Elsevier | 2020|Keywords: Cyber-security, Distributed security -
A parallel image encryption algorithm based on the piecewise linear chaotic map and hyper-chaotic map
Online Contents | 2018|Keywords: Image security, Security analysis -
Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
Elsevier | 2009|Keywords: Information security, End-user security behaviors, Security policy compliance -
A parallel image encryption algorithm based on the piecewise linear chaotic map and hyper-chaotic map
Online Contents | 2018|Keywords: Image security, Security analysis -
Teachers' and students' attitudes towards information security: A qualitative study
Wiley | 2020|Keywords: information security, information security behavior, information security motivation, information security tools -
Information security management in SOCs and SICs
IOS Press | 2018|Keywords: Information security, information security management, Security Operations Center, Security Intelligence Center, information security incident -
Security versus convenience? An experimental study of user misperceptions of wireless internet service quality
Elsevier | 2011|Keywords: Information security, Security/convenience tradeoff, Security engineering -
Retrospective Analysis of the Main Indicators of Ukraine's Financial Security
Free accessDOAJ | 2019|Keywords: security, financial security, financial security indicators, bank security, monetary security -
A framework for secure IT operations in an uncertain and changing environment
Elsevier | 2017|Keywords: Information security, IT security management, Security investment decisions -
Machine learning-enhanced hybrid cryptography and image steganography algorithm for securing cloud data
IOS Press | 2024|Keywords: Data security, security -
Stackelberg game modeling of cloud security defending strategy in the case of information leaks and corruption
Elsevier | 2020|Keywords: Cloud security, Security threat modeling -
Not all areas are equal: analysis of citations in information security research
Online Contents | 2019|Keywords: Information security, Science of security, Cyber security -
The Design of the Enterprise Network Security Solutions
National licenceTrans Tech Publications | 2014|Keywords: Security, Network Security, Windows Security -
CARMEN: A framework for the verification and diagnosis of the specification of security requirements in cyber-physical systems
Elsevier | 2021|Keywords: Security, Security requirements, Security verification -
A quantitative examination of the intellectual profile and evolution of information security from 1965 to 2015
Online Contents | 2015|Keywords: Computer security, Network security, Cyber security -
Immersive technology-driven investigations on influence factors of cognitive load incurred in construction site hazard recognition, analysis and decision making
Elsevier | 2021|Keywords: Construction safety, Safety hazard, Safety education -
Continuous fields: Enhanced in-vehicle anomaly detection using machine learning models
Elsevier | 2020|Keywords: Controller area network security, Automotive security, Security monitoring -
Hardware/software security co-verification and vulnerability detection: An information flow perspective
Elsevier | 2023|Keywords: Hardware and software security co-verification, Information flow security, Security model, Security property -
Designed on Information Security Systems for Mobile Databases
National licenceTrans Tech Publications | 2014|Keywords: Network Security, Information Security, Data Security, Security Systems -
A Review of Risk Matrices Used in Acute Hospitals in England
Wiley | 2019|Keywords: safety risk assessment, Patient safety -
A game-theoretic approach to model and quantify the security of cyber-physical systems
Elsevier | 2017|Keywords: Security modeling, Security evaluation -
IBE with tight security against selective opening and chosen-ciphertext attacks
Online Contents | 2020|Keywords: Tight security reduction, Selective opening security, Chosen-ciphertext security -
Your memory is working against you: How eye tracking and memory explain habituation to security warnings
Elsevier | 2016|Keywords: Security warnings, Behavioral information security -
Blockchain security in virtual environment
IOS Press | 2022|Keywords: Blockchain security, virtual security -
Knowledge without safety
Online Contents | 2018|Keywords: Method-safety, Safety, Virtue-theoretic safety -
The Information Security and IT Security Questions of Pension Payment
National licenceTrans Tech Publications | 2017|Keywords: Information Security, Pension Security, IT Security -
Research on computer network information security based on improved machine learning
IOS Press | 2020|Keywords: security potential perception, intrusion security detection, Network information security -
Strengthening Safety Compliance in Nuclear Power Operations: A Role‐Based Approach
Wiley | 2014|Keywords: nuclear safety, safety performance, safety procedures -
Examining Factors that Influence the Existence of Heinrich's Safety Triangle Using Site‐Specific H&S Data from More than 25,000 Establishments
Wiley | 2018|Keywords: safety pyramid, safety triangle -
Robustness of Optimal Investment Decisions in Mixed Insurance/Investment Cyber Risk Management
Wiley | 2020|Keywords: security economics, security investments -
BYOD usage and security behaviour of hospital clinical staff: An Australian survey
Elsevier | 2022|Keywords: Security, Health information security -
An economic mechanism for better Internet security
Elsevier | 2008|Keywords: Information Security, Internet security, Interdependent security -
Utilizing safety rule correlation for mobile scaffolds monitoring leveraging deep convolution neural networks
Elsevier | 2021|Keywords: Safety rule compliance, Safety risk correlation pattern, Safety monitoring -
Multi-biometric cryptosystem using graph for secure cloud authentication
IOS Press | 2020|Keywords: Cloud security, cloud database security, biometric cloud security, template security -
Determining the safety culture in a gun factory in Turkey: A fuzzy approach
IOS Press | 2020|Keywords: safety perception, safety culture assessment, workplace safety, safety culture -
(Mis)understanding Safety Culture and Its Relationship to Safety Management
Wiley | 2010|Keywords: safety culture, safety management system, safety culture assessment -
Security of interdependent and identical networked control systems
Elsevier | 2012|Keywords: Interdependent security, System security -
Cyber-physical systems security: Limitations, issues and future trends
Elsevier | 2020|Keywords: Cyber-security threats, Security, Security and performance analysis -
Women, peace and security state-of-art: a bibliometric analysis in social sciences based on SCOPUS database
Online Contents | 2017|Keywords: Security, Peace and security -
Emulating representative software vulnerabilities using field data
Online Contents | 2018|Keywords: Security, Security vulnerabilities -
Secret information security system in computer network based on Bayesian classification and nonlinear algorithm
Free accessDeGruyter | 2022|Keywords: security index, security secret, information security -
Analysis of vehicle’s safety envelope under car-following model
Elsevier | 2017|Keywords: Safety envelope, Safety index -
Cyber hygiene: The concept, its measure, and its initial tests
Elsevier | 2019|Keywords: Cyber security, Science of cyber security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.