Year of publication
Subject
Type of material
Licence
TIB reading rooms collection
LUH institutes collection
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Enhancing SOC threat detection and classification with ML ; Melhorando a deteção e classificação de ameaças no SOC com ML
Free accessBASE | 2026|Keywords: Security Operation Centers, Security information and event management, Cyber security -
Secure software development life cycle ; Ciclo seguro de desenvolvimento de software
Free accessBASE | 2026|Keywords: Security -
Exploring the role of assurance context in system security assurance evaluation: a conceptual model
Emerald Group Publishing | 2024|Keywords: Security assurance, Security evaluation, System security -
Artificial Intelligence for Cyber Security
Current Trends and Future ChallengesWiley | 2024|Keywords: Computer network security, information security, cyber security, application security, artificial intelligence‐based cyber security -
A Glance View on Cloud Infrastructures Security and Solutions
Wiley | 2024|Keywords: application security, network security, host security, data security -
Ontology-Based Metrics Computation for System Security Assurance Evaluation
Free accessTaylor & Francis Verlag | 2024|Keywords: System security, security assurance, security metrics -
Cybercrime in India: An analysis of crime against women in ever expanding digital space
Wiley | 2024|Keywords: communication security, information security -
Cloud and Edge Networking Security
Wiley | 2024|Keywords: cloud networking security, edge networking security, security cloud, SIM‐based security -
Machine learning-enhanced hybrid cryptography and image steganography algorithm for securing cloud data
IOS Press | 2024|Keywords: Data security, security -
Enhancement of KASUMI algorithm by adding hamming code
American Institute of Physics | 2024|Keywords: SECURITY -
A low-cost multi-agent system for physical security in smart buildings
American Institute of Physics | 2024|Keywords: SECURITY -
Risk based inspection and maintenance strategy for subsea pipelines using Bayesian influence diagram
American Institute of Physics | 2024|Keywords: SECURITY -
Key based secured cryptosystems used for online data sharing on the cloud
American Institute of Physics | 2024|Keywords: SECURITY -
High performance packet classification algorithm for network security systems using modified grid-of-tries
American Institute of Physics | 2024|Keywords: SECURITY -
A Holistic Analysis of Internet of Things (IoT) Security: Principles, Practices, and New Perspectives
Free accessDOAJ | 2024|Keywords: security, communication security, device security, service security -
Employees’ BYOD Security Policy Compliance in the Public Sector
Taylor & Francis Verlag | 2024|Keywords: Security policy compliance, BYOD security policy, security culture, public sector security policy, security training and awareness -
New Openings at the Dawn of the Interregnum of Critical Security Studies: The Promises of Visual and Vernacular Turns
Free accessDOAJ | 2024|Keywords: vernacular security, visual security, critical security studies -
UpCy: Safely Updating Outdated Dependencies (Summary)
DataCite | 2024|Keywords: Security maintenance, Security Vulnerabilities -
Cyber security using modern technologies : artificial intelligence, blockchain and quantum cryptography
TIBKAT | 2024|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
DDoS attack detection in SDN: A special attention towards optimization model
American Institute of Physics | 2024|Keywords: NETWORK SECURITY -
Ransomware malware: Attacks and preventions
American Institute of Physics | 2024|Keywords: NETWORK SECURITY -
A new secure mapping scheme on elliptic curve cryptography for internet of things
American Institute of Physics | 2024|Keywords: NETWORK SECURITY -
Role of data security technology in healthcare in protecting confidential patient information and complying with regulations
American Institute of Physics | 2024|Keywords: CYBER SECURITY -
Wannacry ransomware attack: The enemy lies under your blanket
American Institute of Physics | 2024|Keywords: NETWORK SECURITY -
Service centric attribute based block level two step encryption scheme for improved cloud security
American Institute of Physics | 2024|Keywords: CYBER SECURITY -
Comparative study of computer security methodologies for countering cyber attacks
American Institute of Physics | 2024|Keywords: CYBER SECURITY -
EFTS: An encryption file transfer system applying advanced encryption standard (AES) algorithm
American Institute of Physics | 2024|Keywords: NETWORK SECURITY -
Ethereum smart contract security: Design, risks and protection approaches
American Institute of Physics | 2024|Keywords: CYBER SECURITY -
Automated privilege escalation enumeration and execution script for linux
American Institute of Physics | 2024|Keywords: NETWORK SECURITY -
Improving healthcare data integrity using blockchain technology
American Institute of Physics | 2024|Keywords: CYBER SECURITY -
A secure and cost effective platform for employee management system using lightweight standalone framework over El Gamal encryption algorithm
American Institute of Physics | 2024|Keywords: CYBER SECURITY -
Grey hole attack in mobile ad-hoc network mitigation and protection
American Institute of Physics | 2024|Keywords: NETWORK SECURITY -
Matrix Profile data mining for BGP anomaly detection
Elsevier | 2024|Keywords: Cyber security, Internet security, Network security -
Deepfake impact, security threats and potential preventions
American Institute of Physics | 2024|Keywords: NETWORK SECURITY -
Effects of a behavior-based safety observation program: Promoting safe behaviors and safety climate at work
IOS Press | 2024|Keywords: safety program, Construction safety, safety climate -
Organizational perspectives on converged security operations
Emerald Group Publishing | 2024|Keywords: Security collaborative optimization, Corporate security -
Data protection in IoT using CoAP based on enhanced DTLS
American Institute of Physics | 2024|Keywords: CYBER SECURITY -
Web-based biometric authentication system for web applications (WBAS)
American Institute of Physics | 2024|Keywords: NETWORK SECURITY -
A reliable hybrid cryptosystem for colour image encryption
American Institute of Physics | 2024|Keywords: NETWORK SECURITY -
Dark Clouds on the Horizon? Effects of Cloud Storage on Security Breaches
Taylor & Francis Verlag | 2024|Keywords: Cloud Security, Security Breaches -
Improvisation of data security in mobile based data by using novel blowfish algorithm over DES algorithm
American Institute of Physics | 2024|Keywords: CYBER SECURITY -
An alternative DOS attack on windows
American Institute of Physics | 2024|Keywords: NETWORK SECURITY -
Reduced plaintext for ciphers (RPC) algorithm
American Institute of Physics | 2024|Keywords: NETWORK SECURITY -
Software Mitigation of RISC-V Spectre Attacks
Springer Verlag | 2024|Keywords: hardware security, system security, Systems and Data Security, Security Services, Mobile and Network Security -
A study of wearable IoT device (smartwatch) advantages, vulnerabilities and protection
American Institute of Physics | 2024|Keywords: NETWORK SECURITY -
The zero trust framework : threat hunting & quantum mechanics
TIBKAT | 2024|Keywords: COMPUTERS / Internet / Security, COMPUTERS / Networking / Security, Computer security -
An Empirical Examination of Employee Information Security Advice Sharing
Taylor & Francis Verlag | 2024|Keywords: Security advice sharing, security climate, information security awareness -
Cyber Security Control Systems for Operational Technology
Wiley | 2024|Keywords: Operational technology [OT] security, style of cyber security, operational technology security risk
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.