Year of publication
Type of media
Source
Subject
- ‹ All subjects
- Mathematics (21,811)
- Material science (12,324)
- Computer Science (10,353)
- Mechanical engineering, energy technology (5,898)
- Chemical and environmental engineering (4,925)
- Physics (4,884)
- Chemistry (2,401)
- Engineering (2,177)
- Medicine (2,157)
- Electrical engineering (2,016)
- Economics (1,598)
- Traffic engineering (1,439)
- Educational Science (1,240)
- Civil engineering (482)
- Life Sciences (411)
- Medical technology (322)
- Architecture (197)
- Other subjects (114)
- Social Sciences (98)
- Mining (97)
- Earth Sciences (63)
- Law (15)
- Sports Science (10)
- Horticulture (9)
- Philosophy (6)
- Literature Studies (3)
- History (1)
- Linguistics (1)
- Study of religions (1)
Type of material
TIB reading rooms collection
LUH institutes collection
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
1–20 of 34,035 hits
Sort by:
Sort by:
-
Challenges and performance metrics for security operations center analysts: a systematic review
Taylor & Francis Verlag | 2020|Keywords: Security operations center, cyber security, security analysts -
Design Considerations for Building Credible Security Testbeds: Perspectives from Industrial Control System Use Cases
Taylor & Francis Verlag | 2021|Keywords: security simulations, security modelling, cyber security simulations -
On the design of secure primitives for real world applications
Elsevier | 2020|Keywords: Hardware security, Systems security, Security engineering, Computers and networks security -
Bayesian Stackelberg games for cyber-security decision support
Elsevier | 2021|Keywords: Cyber-security, Security games, Security investment -
Risk management-based security evaluation model for telemedicine systems
Free accessDOAJ | 2020|Keywords: Telemedicine security, Medical information security, Smart medical security, Telecare security -
A parallel image encryption algorithm based on the piecewise linear chaotic map and hyper-chaotic map
Online Contents | 2018|Keywords: Image security, Security analysis -
A parallel image encryption algorithm based on the piecewise linear chaotic map and hyper-chaotic map
Online Contents | 2018|Keywords: Image security, Security analysis -
Securing state reconstruction under sensor and actuator attacks: Theory and design
Elsevier | 2020|Keywords: Cyber–physical security, Security monitoring -
CAAVI-RICS model for observing the security of distributed IoT and edge computing systems
Elsevier | 2020|Keywords: Cyber-security, Distributed security -
Digital transformation and challenges to data security and privacy
TIBKAT | 2021|Keywords: Database security, Computer security ; fast, Computer security, Database security ; fast -
Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
Elsevier | 2009|Keywords: Information security, End-user security behaviors, Security policy compliance -
Information security management in SOCs and SICs
IOS Press | 2018|Keywords: Information security, information security management, Security Operations Center, Security Intelligence Center, information security incident -
Examining Factors that Influence the Existence of Heinrich's Safety Triangle Using Site‐Specific H&S Data from More than 25,000 Establishments
Wiley | 2018|Keywords: safety pyramid, safety triangle -
Decision support for selecting information security controls
Taylor & Francis Verlag | 2018|Keywords: Information security, security controls, optimisation of security portfolio -
Machine learning-enhanced hybrid cryptography and image steganography algorithm for securing cloud data
IOS Press | 2024|Keywords: Data security, security -
Strengthening Safety Compliance in Nuclear Power Operations: A Role‐Based Approach
Wiley | 2014|Keywords: nuclear safety, safety performance, safety procedures -
A framework for secure IT operations in an uncertain and changing environment
Elsevier | 2017|Keywords: Information security, IT security management, Security investment decisions -
Cyber breach response that actually works : organizational approach to managing residual risk
TIBKAT | 2020|Keywords: Computer security ; Management, Computer security