Year of publication
Type of media
Source
Subject
- ‹ All subjects
- Electrical engineering (7,557)
- Horticulture (3,901)
- Computer Science (2,205)
- Chemical and environmental engineering (735)
- Educational Science (583)
- Physics (545)
- Life Sciences (298)
- Medicine (235)
- Economics (206)
- Architecture (145)
- Mathematics (100)
- Other subjects (98)
- Engineering (95)
- Social Sciences (76)
- Traffic engineering (70)
- Mechanical engineering, energy technology (69)
- Chemistry (53)
- Earth Sciences (53)
- Civil engineering (19)
- History (7)
- Law (3)
- Literature Studies (3)
- Medical technology (3)
- Material science (2)
Type of material
Licence
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Denial of service attack detection through machine learning for the IoT
Free accessTaylor & Francis Verlag | 2020|Keywords: security, network security -
Determinants of gender differences in household food security perceptions in the Western and Eastern regions of Kenya
Free accessTaylor & Francis Verlag | 2019|Keywords: food security, food security perceptions -
Security of Satellite-Terrestrial Communications: Challenges and Potential Solutions
Free accessDOAJ | 2022|Keywords: Security, network security, satellite security, communications security, NTN security -
Testing different grafting methods for vegetative propagation of baobab (Adansonia digitata L.) in Kenya to assist its domestication and promote cultivation
Free accessTaylor & Francis Verlag | 2017|Keywords: food security, nutrition security -
Dimensions of Health Security—A Conceptual Analysis
Free accessDOAJ | 2020|Keywords: cooperative security, health security, security for individuals -
Scenarios for Global Aquaculture and Its Role in Human Nutrition
Free accessTaylor & Francis Verlag | 2020|Keywords: food security, nutrition security -
Indonesia Cyber Security : Urgency To Establish Cyber Army In The Middle Of Global Terrorist Threat
Free accessDOAJ | 2018|Keywords: cyber security, national security, human security -
Analysis of the physical layer security enhancing of wireless communication system under the random mobile
Free accessIET | 2019|Keywords: system security, physical layer security research, random mobile user physical layer security model, security of data, telecommunication security, artificial noise security scheme, physical layer security performance, physical layer security enhancing -
Analysis of the physical layer security enhancing of wireless communication system under the random mobile
Free accessWiley | 2019|Keywords: physical layer security research, artificial noise security scheme, physical layer security performance, security of data, system security, random mobile user physical layer security model, telecommunication security, physical layer security enhancing -
When Agile Security Meets 5G
Free accessDOAJ | 2020|Keywords: 5G security, agile security, cloud security, security risk management -
Blockchain Applications : Transforming Industries, Enhancing Security, and Addressing Ethical Considerations
Free accessTIBKAT | 2023|Keywords: Network security -
Cryptography : Recent Advances and Future Developments
Free accessTIBKAT | 2021|Keywords: Network security -
Multimodal layer surveillance map based on anomaly detection using multi‐agents for smart city security
Free accessWiley | 2022|Keywords: smart‐city security, security robot -
AutoSecSDNDemo: Demonstration of automated end-to-end security in software-defined networks
Free accessFraunhofer Publica | 2016|Keywords: SDN security, end-to-end security, network security -
Constructing a Secure Data Storage System That Supports Multiple Functions by Using Key Aggregation for Data Sharing in Cloud Storage: A Review
Free accessDOAJ | 2022|Keywords: Data security, Cloud security, cloud security -
Modern security concepts to protect business activities in a network environment
Free accessDOAJ | 2016|Keywords: security policy, security risks, security strategies, information systems security -
Security Technologies and Methods for Advanced Cyber Threat Intelligence, Detection and Mitigation
Free accessGWLB - Gottfried Wilhelm Leibniz Bibliothek | 2022|Keywords: Computer security -
Lightweight Cryptographic Techniques and Cybersecurity Approaches
Free accessTIBKAT | 2022|Keywords: Network security -
Getting to Yes with China in Cyberspace
Free accessTIBKAT | 2016|Keywords: Computer security, Network security -
Security analysis of OpenDayLight, ONOS, RoseMary and RYU SDN controllers
Free accessFraunhofer Publica | 2016|Keywords: security analysis, controller security, network security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.