Year of publication
Type of media
Source
Subject
Type of material
Licence
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Weserwehrbrücke Drakenburg (Nienburg) - Traglastversuche an Überbauteilen
TIB AV-Portal | 1999|Keywords: load-bearing safety -
Nuclear inspections: half a century of safeguards in Europe
TIBKAT | 2005|Keywords: Nukleare Sicherheit -
Stahlbeton-Druckglieder - Einführung zum Tragverhalten
TIB AV-Portal | 2006|Keywords: buckling safety -
Integrating FOSS4G into an enterprise system for Disaster Management
Conference/TalkTIB AV-Portal | 2014|Keywords: security -
On Smart Cities, Smart Energy, And Dumb Security
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
Virtual Secure Boot: Secure Boot support in qemu, kvm and ovmf.
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
Towards a more secure operating system without sacrificing usability: The GNOME challenge
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
What's up in the land of the Linux kernel security?
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
General Data Protection Regulation is coming: What does it mean for your software?
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
Lets break modern binary code obfuscation: A semantics based approach
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
LatticeHacks: Fun with lattices in cryptography and cryptanalysis
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
Implementing an LLVM based Dynamic Binary Instrumentation framework
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
Where in the World Is Carmen Sandiego?: Becoming a secret travel agent
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
Everything you always wanted to know about Certificate Transparency: (but were afraid to ask)
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
Do as I Say not as I Do: Stealth Modification of Programmable Logic Controllers I/O by Pin Control Attack
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
The DROWN Attack: Breaking TLS using SSLv2
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
Type confusion: discovery, abuse, and protection
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
What could possibly go wrong with ?: Side effects include side-channel attacks and bypassing kernel ASLR
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
Build your own NSA: How private companies leak your personal data into the public domain, and how you can buy it.
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
Gone in 60 Milliseconds: Intrusion and Exfiltration in Server-less Architectures
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
TrustZone is not enough: Hijacking debug components for embedded security
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
eMMC hacking, or: how I fixed long-dead Galaxy S3 phones: A journey on how to fix broken proprietary hardware by gaining code execution on it
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
Bootstraping a slightly more secure laptop
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
Æ-DIR: Paranoid user management with OpenLDAP
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
Inside Android’s SafetyNet Attestation: Attack and Defense
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
Visiting The Bear Den: A Journey in the Land of (Cyber-)Espionage
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
Memory Deduplication: The Curse that Keeps on Giving: A tale of 3 different memory deduplication based exploitation techniques
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
Wheel of Fortune: Analyzing Embedded OS Random Number Generators
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
BootStomp: On the Security of Bootloaders in Mobile Devices
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
Zwei-Faktor-Authentifizierung für LDAP: Der privacyIDEA LDAP-Proxy
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
Taking a scalpel to QNX: Analyzing & Breaking Exploit Mitigations and Secure Random Number Generators on QNX 6.6 and 7.0
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
Squeezing a key through a carry bit: No bug is small enough
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
Predicting and Abusing WPA2/802.11 Group Keys
Conference/TalkTIB AV-Portal | 2017|Keywords: Security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.