Year of publication
Type of media
Source
Subject
Type of material
Licence
Language
TIB reading rooms collection
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Enhancing SOC threat detection and classification with ML ; Melhorando a deteção e classificação de ameaças no SOC com ML
Free accessBASE | 2026|Keywords: Security Operation Centers, Security information and event management, Cyber security -
Secure software development life cycle ; Ciclo seguro de desenvolvimento de software
Free accessBASE | 2026|Keywords: Security -
Exploring hybrid security strategies in Ghana: State and private sector partnerships
Taylor & Francis Verlag | 2024|Keywords: Private security, state security, security partnership, security actors -
Artificial Intelligence for Cyber Security
Current Trends and Future ChallengesWiley | 2024|Keywords: Computer network security, information security, cyber security, application security, artificial intelligence‐based cyber security -
Understanding safety engineering practice: Comparing safety engineering practice as desired, as required, and as observed
Elsevier | 2024|Keywords: Safety practice, Safety framework, Safety process, Safety lifecycle, Safety improvements -
A Glance View on Cloud Infrastructures Security and Solutions
Wiley | 2024|Keywords: application security, network security, host security, data security -
Ontology-Based Metrics Computation for System Security Assurance Evaluation
Free accessTaylor & Francis Verlag | 2024|Keywords: System security, security assurance, security metrics -
Machine learning-enhanced hybrid cryptography and image steganography algorithm for securing cloud data
IOS Press | 2024|Keywords: Data security, security -
A multi-group assessment of safety culture among engineering students in the United Arab Emirates
Emerald Group Publishing | 2024|Keywords: Safety culture, Safety behavior, Safety awareness, Safety attitude -
Cloud and Edge Networking Security
Wiley | 2024|Keywords: cloud networking security, edge networking security, security cloud, SIM‐based security -
High performance packet classification algorithm for network security systems using modified grid-of-tries
American Institute of Physics | 2024|Keywords: SECURITY -
KEY ASPECTS AND PROCESS OF FORMATION OF THE MECHANISM FOR ENSURING ECONOMIC SECURITY OF AGRICULTURAL ENTERPRISES
Free accessDOAJ | 2024|Keywords: economic security of enterprises, security mechanism, internal security mechanism, external security mechanism, food security -
A Holistic Analysis of Internet of Things (IoT) Security: Principles, Practices, and New Perspectives
Free accessDOAJ | 2024|Keywords: security, communication security, device security, service security -
Key based secured cryptosystems used for online data sharing on the cloud
American Institute of Physics | 2024|Keywords: SECURITY -
Risk based inspection and maintenance strategy for subsea pipelines using Bayesian influence diagram
American Institute of Physics | 2024|Keywords: SECURITY -
Enhancement of KASUMI algorithm by adding hamming code
American Institute of Physics | 2024|Keywords: SECURITY -
A low-cost multi-agent system for physical security in smart buildings
American Institute of Physics | 2024|Keywords: SECURITY -
Cybercrime in India: An analysis of crime against women in ever expanding digital space
Wiley | 2024|Keywords: communication security, information security -
Creating a Process for Equitable Action to Prevent School and Community Violence
Taylor & Francis Verlag | 2024|Keywords: School safety, community safety, equitable safety -
Employees’ BYOD Security Policy Compliance in the Public Sector
Taylor & Francis Verlag | 2024|Keywords: Security policy compliance, BYOD security policy, security culture, public sector security policy, security training and awareness -
UpCy: Safely Updating Outdated Dependencies (Summary)
DataCite | 2024|Keywords: Security maintenance, Security Vulnerabilities -
Security from Legacy Wireless Systems to 5G Networks
Wiley | 2024|Keywords: security attacks, security services, wireless network security, wireless security architectures -
Cyber security using modern technologies : artificial intelligence, blockchain and quantum cryptography
TIBKAT | 2024|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Matrix Profile data mining for BGP anomaly detection
Elsevier | 2024|Keywords: Cyber security, Internet security, Network security -
Dark Clouds on the Horizon? Effects of Cloud Storage on Security Breaches
Taylor & Francis Verlag | 2024|Keywords: Cloud Security, Security Breaches -
A reliable hybrid cryptosystem for colour image encryption
American Institute of Physics | 2024|Keywords: NETWORK SECURITY -
Association Between Leading Indicators of Safety Performance in Construction Projects
Taylor & Francis Verlag | 2024|Keywords: Safety climate, safety control, construction safety -
Intelligence oversight in times of transnational impunity : who will watch the watchers?
Free accessTIBKAT | 2024|Keywords: Internal security, National security, POLITICAL SCIENCE / Political Freedom & Security / Human Rights, POLITICAL SCIENCE / Political Freedom & Security / International Security, POLITICAL SCIENCE / Political Freedom & Security / Intelligence -
Improvisation of data security in mobile based data by using novel blowfish algorithm over DES algorithm
American Institute of Physics | 2024|Keywords: CYBER SECURITY -
An alternative DOS attack on windows
American Institute of Physics | 2024|Keywords: NETWORK SECURITY -
Reduced plaintext for ciphers (RPC) algorithm
American Institute of Physics | 2024|Keywords: NETWORK SECURITY -
Ethereum smart contract security: Design, risks and protection approaches
American Institute of Physics | 2024|Keywords: CYBER SECURITY -
Data protection in IoT using CoAP based on enhanced DTLS
American Institute of Physics | 2024|Keywords: CYBER SECURITY -
Web-based biometric authentication system for web applications (WBAS)
American Institute of Physics | 2024|Keywords: NETWORK SECURITY -
Deepfake impact, security threats and potential preventions
American Institute of Physics | 2024|Keywords: NETWORK SECURITY -
Automated privilege escalation enumeration and execution script for linux
American Institute of Physics | 2024|Keywords: NETWORK SECURITY -
The “Five Eyes” Intelligence Sharing Relationship : A Contemporary Perspective
TIBKAT | 2024|Keywords: Security, International. -
A study of wearable IoT device (smartwatch) advantages, vulnerabilities and protection
American Institute of Physics | 2024|Keywords: NETWORK SECURITY -
Service centric attribute based block level two step encryption scheme for improved cloud security
American Institute of Physics | 2024|Keywords: CYBER SECURITY -
Comparative study of computer security methodologies for countering cyber attacks
American Institute of Physics | 2024|Keywords: CYBER SECURITY -
EFTS: An encryption file transfer system applying advanced encryption standard (AES) algorithm
American Institute of Physics | 2024|Keywords: NETWORK SECURITY -
DDoS attack detection in SDN: A special attention towards optimization model
American Institute of Physics | 2024|Keywords: NETWORK SECURITY -
Ransomware malware: Attacks and preventions
American Institute of Physics | 2024|Keywords: NETWORK SECURITY -
A new secure mapping scheme on elliptic curve cryptography for internet of things
American Institute of Physics | 2024|Keywords: NETWORK SECURITY -
Risk-based safety scoping of adversary-centric security testing on Operational Technology
Elsevier | 2024|Keywords: Cyber security, Security testing -
Role of data security technology in healthcare in protecting confidential patient information and complying with regulations
American Institute of Physics | 2024|Keywords: CYBER SECURITY -
Wannacry ransomware attack: The enemy lies under your blanket
American Institute of Physics | 2024|Keywords: NETWORK SECURITY
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.