Year of publication
Subject
Type of material
Licence
TIB reading rooms collection
LUH institutes collection
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Practical Covertly Secure MPC for Dishonest Majority - Or: Breaking the SPDZ Limits
Tema Archive | 2013|Keywords: Sicherheit, aktive Sicherheit, beweisbare Sicherheit -
Enabling security functions with SDN: A feasibility study
Elsevier | 2015|Keywords: Network security, Software-defined networking security, SDN security -
The prospects of easier security for small organisations and consumers
Elsevier | 2015|Keywords: Data security, Information security, Baseline security, Security profile -
Apparatus: A framework for security analysis in internet of things systems
Elsevier | 2018|Keywords: IoT Security, Security requirements, Smart cities security -
Exporting decentred security governance: the tensions of security sector reform
Taylor & Francis Verlag | 2016|Keywords: security sector reform, security governance, security/development -
Denial of service attack detection through machine learning for the IoT
Free accessTaylor & Francis Verlag | 2020|Keywords: security, network security -
Impact of static and dynamic load models on security margin estimation methods
Elsevier | 2021|Keywords: Dynamic security margins, Dynamic security limits, Security assessment, Security margin estimation -
Security and Privacy Service Level Agreement composition for Internet of Things systems on top of standard controls
Elsevier | 2022|Keywords: Cloud security, IoT security, Security and privacy, Security SLA -
The Security of Multiple Encryption in the Ideal Cipher Model
Tema Archive | 2014|Keywords: Sicherheit, beweisbare Sicherheit -
The fast image encryption algorithm based on lifting scheme and chaos
Elsevier | 2020|Keywords: Information security, Security analysis -
Model-based evaluation of combinations of Shuffle and Diversity MTD techniques on the cloud
Elsevier | 2019|Keywords: Security analysis, Security metrics, Security modeling -
On the design of secure primitives for real world applications
Elsevier | 2020|Keywords: Hardware security, Systems security, Security engineering, Computers and networks security -
A survey on registration hijacking attack consequences and protection for session initiation protocol (SIP)
Elsevier | 2020|Keywords: Network security, Sip security -
Cloud Infrastructure Security
Wiley | 2019|Keywords: Infrastructure security, Information security, Hypervisor Security, Virtualization Security -
A framework and tool for the assessment of information security risk, the reduction of information security cost and the sustainability of information security culture
Online Contents | 2021|Keywords: Information security, Information security evaluation, The ARCS security framework, Information security culture, Information security assessment, Information security cost -
Novel security models, metrics and security assessment for maritime vessel networks
Elsevier | 2021|Keywords: Security analysis, Security metrics, Security models -
Physical unclonable functions based secret keys scheme for securing big data infrastructure communication
Elsevier | 2019|Keywords: IoT Security, Zigbee security, Hardware security -
European Foreign and Security Policy : States. Power, Institutions
GWLB - Gottfried Wilhelm Leibniz Bibliothek | 2010|Keywords: National security, National security. -
Government regulations in cyber security: Framework, standards and recommendations
Elsevier | 2018|Keywords: Cyber security, Information security -
The legal framework of the OSCE
GWLB - Gottfried Wilhelm Leibniz Bibliothek | 2019|Keywords: National security ; Law and legislation ; Europe, Security, International, Organization for Security and Co-operation in Europe, National security -
Critiquing the regulation of private security in the United Kingdom: views from inside the sector
Taylor & Francis Verlag | 2017|Keywords: Governance of security, security regulation, security sector, security managers -
Das neue EU-Datenschutzrecht – von der Richtlinie zur Verordnung
DeGruyter | 2016|Keywords: Daten und Sicherheit -
All-Or-Nothing data protection for ubiquitous communication: Challenges and perspectives
Elsevier | 2019|Keywords: Data security, Multimedia security -
Some aspects of internal security policy as an element of the national security strategy of the Republic of Serbia
Free accessDOAJ | 2017|Keywords: security, internal security, national security strategy, national security policy, internal security policy -
PROSEC TEST FOR THRIVE PROTECTIVE SECURITY RULES AGAINST THREATS, RISKS AND VULNERABILITIES
Free accessDOAJ | 2023|Keywords: security rules, security responsibilities, information security, security education -
Security of Satellite-Terrestrial Communications: Challenges and Potential Solutions
Free accessDOAJ | 2022|Keywords: Security, network security, satellite security, communications security, NTN security -
OSCAR: Object security architecture for the Internet of Things
Elsevier | 2014|Keywords: Communication security, Object security, End-to-end security -
Social network security: Issues, challenges, threats, and solutions
Elsevier | 2017|Keywords: Security and privacy, Security threats -
A Study on Acceptance Procedure Improvement of Web Application by Outsourcing for Mobile Service
Online Contents | 2016|Keywords: Security architecture, Information security, Security management -
Semantic security against web application attacks
Elsevier | 2013|Keywords: Application security, Semantic security -
The sentinel and the rebel. Multi-choice policing in Burundi and the state-centered approach of security sector reform
Online Contents | 2016|Keywords: Security Actor, Private Security, Security Sector, Security Force -
Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation
Tema Archive | 2013|Keywords: Sicherheit, beweisbare Sicherheit -
A machine-learning based probabilistic perspective on dynamic security assessment
Elsevier | 2020|Keywords: Security Rules, Dynamic Security Assessment, Probabilistic Security Assessment -
Limits of Provable Security for Homomorphic Encryption
Tema Archive | 2013|Keywords: Sicherheit, beweisbare Sicherheit -
A Dynamic Tradeoff between Active and Passive Corruptions in Secure Multi-Party Computation
Tema Archive | 2013|Keywords: passive Sicherheit, aktive Sicherheit -
Network security assessment using a semantic reasoning and graph based approach
Elsevier | 2017|Keywords: Network security, Security ontology -
Role of Explainable AI in 6G Security*
Wiley | 2023|Keywords: explainable security, AI security, 6G security, security of XAI -
A Study on Financing Security for Smartphones Using Text Mining
Online Contents | 2017|Keywords: Smartphone security, Security, Smartphone financing security -
Examining the need for a high level of therapeutic security at a regional forensic mental health service in Aotearoa New Zealand
Taylor & Francis Verlag | 2024|Keywords: therapeutic security, high security, relational security, procedural security, physical security -
On the Feasibility of Extending Oblivious Transfer
Tema Archive | 2013|Keywords: Sicherheit, statische Sicherheit -
Research and Design of the Security Area Classification Model of Electric Power Information System
National licenceTrans Tech Publications | 2011|Keywords: Information Security, Network Business Security, Security Area Classification, Electric Power Information Security -
An architecture to manage security operations for digital service chains
Elsevier | 2020|Keywords: Cyber-security paradigms, Security architectures -
MAPE-K/MAPE-SAC: An interaction framework for adaptive systems with security assurance cases
Elsevier | 2020|Keywords: Security assurance cases, Security certification -
Systematic survey of advanced metering infrastructure security: Vulnerabilities, attacks, countermeasures, and future vision
Elsevier | 2022|Keywords: Security vulnerability, Security threat, Security attack -
TARP: Ticket-based address resolution protocol
Elsevier | 2007|Keywords: Network security, ARP security -
Geopolitical aspects of energy security and environmental security in the Republic of Serbia
Free accessDOAJ | 2020|Keywords: security, energy security, environmental security -
A new unified image encryption algorithm based on a lifting transformation and chaos
Elsevier | 2020|Keywords: Information security, Security analysis -
Cyber security in the Smart Grid: Survey and challenges
Elsevier | 2012|Keywords: Cyber security, Security protocols -
Cloud security engineering: Early stages of SDLC
Elsevier | 2016|Keywords: Cloud security, Security vulnerabilities -
The area-efficient gate level information flow tracking schemes of digital circuit with multi-level security lattice
Elsevier | 2023|Keywords: Hardware security, Security lattice, Security label
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.