Year of publication
Type of media
Subject
- ‹ All subjects
- Electrical engineering (7,225)
- Computer Science (1,956)
- Educational Science (501)
- Physics (499)
- Mathematics (89)
- Traffic engineering (47)
- Mechanical engineering, energy technology (30)
- Engineering (20)
- Architecture (19)
- Other subjects (15)
- Economics (11)
- Chemical and environmental engineering (9)
- Civil engineering (4)
- Earth Sciences (3)
- Mining (2)
- Material science (2)
- Medical technology (2)
- Medicine (2)
- Law (1)
Type of material
Licence
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Survey of smart contract security
Free accessDOAJ | 2020|Keywords: on-chain security, off-chain security, security analysis -
Securing the Intermediate Data of Scientific Workflows in Clouds With ACISO
Free accessDOAJ | 2019|Keywords: Cloud security, intermediate data security, security strategy allocation -
Oracle Indistinguishability and Its Applications
Free accessDOAJ | 2023|Keywords: quantum security, classical security, oracle security -
System-Agnostic Security Domains for Understanding and Prioritizing Systems Security Engineering Efforts
Free accessDOAJ | 2017|Keywords: Security domains, systems security engineering, security engineering -
A Customizable Framework for Prioritizing Systems Security Engineering Processes, Activities, and Tasks
Free accessDOAJ | 2017|Keywords: Systems security engineering, security engineering, security framework -
Power maximisation technique for generating secret keys by exploiting physical layer security in wireless communication
Free accessIET | 2020|Keywords: secret key based security, physical layer security, communication security, keyless security, telecommunication security, secret key-based security -
Privacy‐preserving data integration scheme in industrial robot system based on fog computing and edge computing
Free accessDOAJ | 2024|Keywords: computer network security, security of data -
Cyber Security Maturity Assessment Framework for Technology Startups: A Systematic Literature Review
Free accessDOAJ | 2023|Keywords: Cyber security risk, cyber security maturity, cyber security framework, return of security investment -
Power maximisation technique for generating secret keys by exploiting physical layer security in wireless communication
Free accessWiley | 2020|Keywords: keyless security, communication security, telecommunication security, secret key based security, secret key‐based security, physical layer security -
Comments on an Improved RFID Security Protocol for ISO/IEC WD 29167‐6
Free accessWiley | 2013|Keywords: RFID security -
Information Security and Organizational Performance: Empirical Study of Korean Securities Industry
Free accessWiley | 2015|Keywords: security industry, Information security -
Physical Layer Security for Beyond 5G: Ultra Secure Low Latency Communications
Free accessDOAJ | 2021|Keywords: Physical layer security, 6G security, beyond 5G security, security at layer-1 -
New Trends and Developments in Biometrics
Free accessGWLB - Gottfried Wilhelm Leibniz Bibliothek | 2012|Keywords: Computer security -
A Puff of Steem: Security Analysis of Decentralized Content Curation
Free accessDataCite | 2020|Keywords: Security and privacy → Distributed systems security -
Automated Incident Response for Industrial Control Systems Leveraging Software-defined Networking
Free accessFraunhofer Publica | 2019|Keywords: SDN security, ICS Security -
Detection of Denial-of-Service Attack in Wireless Sensor Networks: A Lightweight Machine Learning Approach
Free accessDOAJ | 2023|Keywords: cyber security, IoT security, network security -
Small Modular Reactors and Advanced Reactor Security: Regulatory Perspectives on Integrating Physical and Cyber Security by Design to Protect Against Malicious Acts and Evolving Threats
Free accessDOAJ | 2020|Keywords: security by design, nuclear security, nuclear security regulations -
The defender's dilemma : charting a course toward cybersecurity
Free accessGWLB - Gottfried Wilhelm Leibniz Bibliothek | 2015|Keywords: COMPUTERS ; Internet ; Security, Computer networks ; Security measures ; Government policy, Computer networks ; Security measures, Industries ; Security measures -
An Overview of the Security Landscape of Virtual Mobile Networks
Free accessDOAJ | 2021|Keywords: Security, virtual mobile networks (VMNs) security, NFV security -
Energy‐efficient covert communication with adaptive assist nodes group
Free accessWiley | 2023|Keywords: telecommunication security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.