Page 1 from 194,845 hits

Sort by: Relevancy | Currentness | Title

Filter results

External sources


Synonyms were used for: Sicherheit

Search without synonyms: keywords:(Sicherheit)

Used synonyms:

  • safety
  • security

    Eliciting and refining requirements for comprehensible security

    Broadnax, B. / Birnstill, Pascal / Müller-Quade, J. et al. | Fraunhofer Publica | 2016
    Keywords: information security, security requirements, comprehensible security

    Security Indicators - a State of the Art Survey Public Report

    Rudolph, Manuel / Schwarz, Reinhard | Fraunhofer Publica | 2012
    Keywords: software security, security measure, security metric, security indicator, security improvement

    Was ist uns "Sicherheit" wert - und Sicherheit wovor?: Über die Sicherheit des Bürgers im Alltag

    Wiemken, Uwe | Fraunhofer Publica | 2016
    Keywords: innere Sicherheit, äußere Sicherheit

    Quantifying the attack surface of a web application

    Heumann, T. / Keller, J. / Türpe, S. | Fraunhofer Publica | 2010
    Keywords: security metric, application security, security evaluation

    Managing security work in scrum: Tensions and challenges

    Türpe, Sven / Poller, Andreas | Fraunhofer Publica | 2017
    Keywords: security requirements, security work, software security

    2017 Emerging Technology Domains Risk Survey

    D. Klinedinst / J. Land / K. O'Meara | NTIS | 2017
    Keywords: Information security, Homeland Security

    AutoSecSDNDemo: Demonstration of automated end-to-end security in software-defined networks

    Khondoker, Rahamatullah / Larbig, Pedro / Senf, Daniel et al. | Fraunhofer Publica | 2016
    Keywords: SDN security, end-to-end security, network security

    Privacy-respecting smart video surveillance based on usage control enforcement

    Birnstill, Pascal | Fraunhofer Publica | 2016
    Keywords: Sicherheit

    Security analysis of OpenDayLight, ONOS, RoseMary and RYU SDN controllers

    Arbettu, Ramachandra Kamath / Khondoker, Rahamatullah / Bayarou, Kpatcha et al. | Fraunhofer Publica | 2016
    Keywords: controller security, network security, security analysis

    Berechnungsbeispiel zur funktionalen Sicherheit

    Schloske, Alexander / Gerstmayr, Stefan | Fraunhofer Publica | 2014
    Keywords: funktionale Sicherheit, Sicherheit

    High granular multi-level-security model for improved usability

    Thorleuchter, Dirk / Poel, Dirk van den | Fraunhofer Publica | 2011
    Keywords: multilevel security, security

    Point-and-Shoot Security Design: Can We Build Better Tools for Developers?

    Türpe, Sven | Fraunhofer Publica | 2012
    Keywords: macroscopic security, security engineering, security model, security properties, security tools

    The evolving concept of security: A critical evaluation across four dimensions

    Jovanovic, Milos / Burbiel, Joachim | Fraunhofer Publica | 2014
    Keywords: concept of security, security politics, perception of security, areas of security, stability and security

    Data residency challenges and opportunities for standardization

    Abramson, Mike / Arbuckle, Brian / Baudoin, Claude et al. | Fraunhofer Publica | 2017
    Keywords: data security, security policy, security

    Adapting an Agent-Based Model of Socio-Technical Systems to Analyze Security Failures

    A. Roque / C. Cunningham | NTIS | 2016
    Keywords: Security failures, Security, Cyber security

    Enhancing cloud security with context-aware usage control policies

    Jung, Christian / Eitel, Andreas / Schwarz, Reinhard | Fraunhofer Publica | 2014
    Keywords: security, security policy, usage control security, cloud security

    Der Graph-Editor auf dem Prüfstand für den Bereich Funktionale Sicherheit nach ISO 26262

    Schloske, Alexander | Fraunhofer Publica | 2014
    Keywords: funktionale Sicherheit, Sicherheit

    D9.1 - Final report on the evolving concept of security

    Jovanovic, Milos / Burbiel, Joachim / Walther, Gerald et al. | Fraunhofer Publica | 2015
    Keywords: evolving concept of security, perceptions of security

    Security overlay for distributed encrypted containers

    Patzer, F. / Jakoby, A. / Kresken, Thomas et al. | Fraunhofer Publica | 2015
    Keywords: security architecture, mobile security, information security management

Number of results: 10 | 20 | 50