Year of publication
Type of media
Source
Subject
Type of material
Language
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Improving software security awareness using a serious game
Free accessIET | 2018|Keywords: security related scenarios, security education, software security awareness, security of data, Cyber Security-Requirements Awareness Game -
Analysis of the physical layer security enhancing of wireless communication system under the random mobile
Free accessIET | 2019|Keywords: system security, physical layer security research, random mobile user physical layer security model, security of data, telecommunication security, artificial noise security scheme, physical layer security performance, physical layer security enhancing -
Multi-objective evolutionary approach to select security solutions
Free accessIET | 2017|Keywords: security issues, optimised security method, efficient security solutions, security methods -
Physical layer security with dynamic behaviour cooperator based on coalitional game
Free accessIET | 2014|Keywords: physical layer security, original security transmission condition, maximum PHY security capacity, security of data -
Physical-layer security in Internet of Things based on compressed sensing and frequency selection
Free accessIET | 2017|Keywords: physical layer security, security method, CS security model, telecommunication security, information security -
Safety and security risk assessment in cyber-physical systems
Free accessIET | 2019|Keywords: security-critical system, security risk assessment, safety incidents, security attacks, security of data, safety-critical system -
Distribution network reconfiguration comprehensively considering N−1 security and network loss
Free accessIET | 2018|Keywords: N−1 security criterion, N−1 security margin, power system security, distribution system security region, security margin constraints -
Physical unclonable function: architectures, applications and challenges for dependable security
Free accessIET | 2020|Keywords: dependable security, security solutions, security of data, hardware-specific security primitive, desired security levels, telecommunication security -
Mitigating application layer distributed denial of service attacks via effective trust management
IET | 2010|Keywords: telecommunication security, security of data -
Approaching secure industrial control systems
Free accessIET | 2015|Keywords: security cost estimation, security of data, security programme, information security assurance activities, security assessment scheme -
Critical survey of existing publicly verifiable secret sharing schemes
IET | 2012|Keywords: security of data -
Power maximisation technique for generating secret keys by exploiting physical layer security in wireless communication
Free accessIET | 2020|Keywords: secret key based security, physical layer security, communication security, keyless security, telecommunication security, secret key-based security -
Security analysis of cyber-physical systems using $\mathcal {H}_2$H2 norm
Free accessIET | 2017|Keywords: security index, security analysis, power system security, security of data -
Passenger acceptance of counter-terrorism security measures in stations
Free accessIET | 2016|Keywords: individual passenger security screening methods, security, counter terrorism security -
SACK2: effective SYN flood detection against skillful spoofs
IET | 2012|Keywords: computer network security -
An adaptive distributed certificate management scheme for space information network
Free accessIET | 2013|Keywords: security vulnerability, security requirements, security mechanisms, security risks -
Survey of security services on group communications
IET | 2010|Keywords: computer network security -
Secrets of the data stream [security system]
IET | 2010|Keywords: telecommunication security, security of data -
ASCAA: API-level security certification of android applications
Free accessIET | 2017|Keywords: security threat identification, ASCAA Security Language, API-level security certification-of-Android applications, security threat analysis, requirement-dependent security rules, security threats -
Light-weight framework for security-sensitive wireless sensor networks applications
Free accessIET | 2013|Keywords: security-sensitive wireless sensor networks applications, security framework, security-sensitive WSN, security-sensitive WSN applications, security, telecommunication security -
Steady-state security assessment method based on distance to security region boundaries
Free accessIET | 2013|Keywords: steady state security assessment method, security margins, power system security, steady state security region, steady state security distance, security region boundaries -
Security-level classification based on power system partitioning
Free accessIET | 2019|Keywords: security margin index, power system security states, security assessment, power system security, security-level classification, exact security level, security classification, comprehensive safety index -
Coherence analysis of road safe speed and driving behaviour from floating car data
Free accessIET | 2020|Keywords: safety driver advisory unit, safety measures, road safety performances process, safety monitoring, road safety, smart road safety analysis, general road safety analysis framework, safety conditions, safety enforcement schemes -
Effective metric for detecting distributed denial-of-service attacks based on information divergence
IET | 2009|Keywords: security of data -
Multi-objective generation dispatch considering the trade-off between economy and security
Free accessIET | 2017|Keywords: deterministic N−1 security criterion, power system security, security-constrained optimal power flow, security objectives -
Operating system security by integrity checking and recovery using write-protected storage
Free accessIET | 2014|Keywords: system security, security constraints, security of data, security database management, Linux security model -
Simulation framework for security threats in cognitive radio networks
IET | 2012|Keywords: telecommunication security -
Relay selection for secure backscatter wireless communications
Free accessIET | 2015|Keywords: physical layer security, telecommunication security, anti-eavesdropping security -
Design and implementation of an embedded intrusion detection system for wireless applications
IET | 2012|Keywords: computer network security -
Security evaluation of biometric authentication systems under real spoofing attacks
IET | 2012|Keywords: security of data -
Rate regions of secret key sharing in a new source model
IET | 2011|Keywords: telecommunication security -
Dynamic-scheduling mechanism of controllers based on security policy in software-defined network
Free accessIET | 2016|Keywords: computer network security, security performance, security policy, NOS security improvement -
Framework for trajectory-based probabilistic security assessment of power systems
Free accessIET | 2019|Keywords: system security, contingency-based probabilistic security assessments, power system security, trajectory-based probabilistic security assessment, security analyses, real-time security assessment -
Comment on ‘SFVCC: Chaotic map-based security framework for vehicular cloud computing’
Free accessIET | 2020|Keywords: computer network security, security of data, chaotic map-based security framework, telecommunication security -
Improving security in cache memory by power efficient scrambling technique
Free accessIET | 2015|Keywords: security improvement, security measures, security of data, security protocols, security technique -
Opportunistic relay selection for cooperative networks with secrecy constraints
IET | 2010|Keywords: telecommunication security -
Node capture attack detection and defence in wireless sensor networks
IET | 2012|Keywords: telecommunication security -
Service level agreement-based GDPR compliance and security assurance in (multi)Cloud-based systems
Free accessIET | 2019|Keywords: security level objectives, security of data, security controls, security assurance -
Modelling and evaluation of the security of cyber-physical systems using stochastic Petri nets
Free accessIET | 2018|Keywords: security countermeasures, system-focused quantitative security measures, security attacks, security of data -
Security attacks and solutions for vehicular ad hoc networks
IET | 2010|Keywords: telecommunication security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.