Page 1 from 608,504 hits

Sort by: Relevancy | Currentness | Title

Filter results

External sources

Searching...

Synonyms were used for: Sicherheit

Search without synonyms: keywords:(Sicherheit)

Used synonyms:

  • safety
  • security
  1.  

    Water and U.S. national security

    Busby, Joshua / Council on Foreign Relationspublisher | TIBKAT | 2017
    Keywords: Security, International, National security, Water security
  2.  

    Security Warning Life Cycle: Challenges and Panacea

    Samsudin, Nur Farhana / Zaaba, Zarul Fitri | BASE | 2017
    Keywords: Security, Security Dialogues, Security Warning, Usable Security
  3.  

    Sicherheit

    Hoch, Gero / Schröteler- von Brandt, Hildegard / Schwarz, Angela | TIBKAT | 2017
    Keywords: Sicherheit, Innere Sicherheit
  4.  

    Novel efficient techniques for real-time cloud security assessment

    Modic, Jolanda / Trapero, Ruben / Taha, Ahmed et al. | Elsevier | 2016
    Keywords: Cloud security, Security quantification, Security evaluation, Security level agreements, Security metrics
  5.  

    Eliciting and refining requirements for comprehensible security

    Broadnax, B. / Birnstill, Pascal / Müller-Quade, J. et al. | Fraunhofer Publica | 2016
    Keywords: information security, security requirements, comprehensible security
  6.  

    The design of phishing studies: Challenges for researchers

    Parsons, Kathryn / McCormac, Agata / Pattinson, Malcolm et al. | Elsevier | 2015
    Keywords: Information security, Security behaviours, Email security, Security training
  7.  

    Critiquing the regulation of private security in the United Kingdom: views from inside the sector

    Mawby, Rob / Gill, Martin | Taylor & Francis Verlag | 2017
    Keywords: Governance of security, security regulation, security sector, security managers
  8.  

    Conclusion

    Edgerton, Michael | Wiley | 2013
    Keywords: maritime security, port security, design security, security risk
  9.  

    Security behaviors of smartphone users

    Das, Amit / Khan, Habib Ullah | Emerald Group Publishing | 2016
    Keywords: Security, Information security
  10.  

    Personal Security within the Human Security Paradigm

    Gierszewski, Janusz | DataCite | 2017
    Keywords: state security, human security, personal security
  11.  

    Personal Security: Current State and Development Prospects for the Reflection on Security of Individuals and Human Collectivitie

    Urbanek, Andrzej | DataCite | 2017
    Keywords: personal security, structural security, human security
  12.  

    OPSEC Model and Applications

    Akman, M. Kubilay | DataCite | 2018
    Keywords: security studies, sociology of security, security management, information security, cyber security
  13.  

    Information security management in SOCs and SICs

    Miloslavskaya, Natalia | IOS Press | 2018
    Keywords: Information security, information security incident, information security management, Security Operations Center, Security Intelligence Center
  14.  

    Estimating influence of threat using Misuse Case Oriented Quality Requirements (MCOQR) metrics: Security requirements engineering perspective

    Banerjee, Chitresh / Banerjee, Arpita / Sharma, S.K. | IOS Press | 2017
    Keywords: Security, software security, security metrics, software security metrics, security requirements engineering
  15.  

    Port security training and education in Europe—a framework and a roadmap to harmonization

    Urciuoli, Luca | Taylor & Francis Verlag | 2016
    Keywords: Port security, port security training, security training Europe, security education Europe, port security roadmap
  16.  

    A Survey on Systems Security Metrics

    Pendleton, Marcus / Garcia-Lebron, Richard / Cho, Jin-Hee et al. | Online Contents | 2017
    Keywords: quantitative security, security measurement, security foundation, Security metrics
  17.  

    The impact of repeated data breach events on organisations’ market value

    Schatz, Daniel / Bashroush, Rabih | Emerald Group Publishing | 2016
    Keywords: Security, Information security
  18.  

    Socio-technical systems cybersecurity framework

    Malatji, Masike / Von Solms, Sune / Marnewick, Annlizé | Emerald Group Publishing | 2019
    Keywords: Information security, Security
  19.  

    Masking Proofs are Tight and How to Exploit it in Security Evaluations

    Grosso, Vincent / Standaert, François-Xavier | BASE | 2018
    Keywords: Security level; Security evaluation
  20.  

    The character and value of vernacular security: the case of South West Cameroon

    Baker, Bruce / Lekunze, Manu | Taylor & Francis Verlag | 2019
    Keywords: Vernacular security, contested security, security studies, security in Cameroon

Number of results: 10 | 20 | 50