Year of publication
Type of media
Source
Subject
- ‹ All subjects
- Mathematics (21,811)
- Computer Science (10,326)
- Medicine (2,254)
- Engineering (2,169)
- Physics (1,659)
- Electrical engineering (1,592)
- Economics (1,454)
- Educational Science (1,251)
- Traffic engineering (857)
- Sports Science (340)
- Life Sciences (324)
- Mechanical engineering, energy technology (323)
- Medical technology (256)
- Chemistry (204)
- Chemical and environmental engineering (114)
- Social Sciences (114)
- Civil engineering (100)
- Material science (100)
- Other subjects (87)
- Earth Sciences (54)
- Mining (34)
- Architecture (32)
- Law (21)
- Philosophy (7)
- History (3)
- Horticulture (3)
- Literature Studies (3)
- Linguistics (1)
- Study of religions (1)
Type of material
TIB reading rooms collection
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
1–20 of 22,141 hits
Sort by:
Sort by:
-
Challenges and performance metrics for security operations center analysts: a systematic review
Taylor & Francis Verlag | 2020|Keywords: Security operations center, cyber security, security analysts -
Design Considerations for Building Credible Security Testbeds: Perspectives from Industrial Control System Use Cases
Taylor & Francis Verlag | 2021|Keywords: security simulations, security modelling, cyber security simulations -
On the design of secure primitives for real world applications
Elsevier | 2020|Keywords: Hardware security, Systems security, Security engineering, Computers and networks security -
Bayesian Stackelberg games for cyber-security decision support
Elsevier | 2021|Keywords: Cyber-security, Security games, Security investment -
Risk management-based security evaluation model for telemedicine systems
Free accessDOAJ | 2020|Keywords: Telemedicine security, Medical information security, Smart medical security, Telecare security -
A parallel image encryption algorithm based on the piecewise linear chaotic map and hyper-chaotic map
Online Contents | 2018|Keywords: Image security, Security analysis -
A parallel image encryption algorithm based on the piecewise linear chaotic map and hyper-chaotic map
Online Contents | 2018|Keywords: Image security, Security analysis -
Securing state reconstruction under sensor and actuator attacks: Theory and design
Elsevier | 2020|Keywords: Cyber–physical security, Security monitoring -
Information security management in SOCs and SICs
IOS Press | 2018|Keywords: Information security, information security management, Security Operations Center, Security Intelligence Center, information security incident -
CAAVI-RICS model for observing the security of distributed IoT and edge computing systems
Elsevier | 2020|Keywords: Cyber-security, Distributed security -
Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
Elsevier | 2009|Keywords: Information security, End-user security behaviors, Security policy compliance -
Digital transformation and challenges to data security and privacy
TIBKAT | 2021|Keywords: Database security, Computer security ; fast, Computer security, Database security ; fast -
Examining Factors that Influence the Existence of Heinrich's Safety Triangle Using Site‐Specific H&S Data from More than 25,000 Establishments
Wiley | 2018|Keywords: safety pyramid, safety triangle -
Decision support for selecting information security controls
Taylor & Francis Verlag | 2018|Keywords: Information security, security controls, optimisation of security portfolio -
Machine learning-enhanced hybrid cryptography and image steganography algorithm for securing cloud data
IOS Press | 2024|Keywords: Data security, security -
Strengthening Safety Compliance in Nuclear Power Operations: A Role‐Based Approach
Wiley | 2014|Keywords: nuclear safety, safety performance, safety procedures -
A framework for secure IT operations in an uncertain and changing environment
Elsevier | 2017|Keywords: Information security, IT security management, Security investment decisions -
Security versus convenience? An experimental study of user misperceptions of wireless internet service quality
Elsevier | 2011|Keywords: Information security, Security/convenience tradeoff, Security engineering -
Automating Security Risk and Requirements Management for Cyber-Physical Systems
Free accessBASE | 2020|Keywords: Security risk management, Machine-readable security requirements, Risk-driven security, Security engineering, Security requirements, Security risk assessment, Security risk mitigation, Security risk monitoring, Automotive security, CPS security, IIoT security, OT security