Seite 1 von 201.052 Ergebnissen

Sortieren nach: Relevanz | Aktualität | Titel

Für folgende Begriffe wurden Synonyme verwendet: Sicherheit

Suche ohne Synonyme: keywords:(Sicherheit)

Verwendete Synonyme:

  • safety
  • security
  1.  

    2017 Emerging Technology Domains Risk Survey

    D. Klinedinst / J. Land / K. O'Meara | NTIS | 2017
    Schlagwörter: Information security, Homeland Security
  2.  

    Adapting an Agent-Based Model of Socio-Technical Systems to Analyze Security Failures

    A. Roque / C. Cunningham | NTIS | 2016
    Schlagwörter: Security failures, Security, Cyber security
  3.  

    Security Engineering Project

    B. Horowitz | NTIS | 2012
    Schlagwörter: Computer security, Information security, Cyber security, System aware security
  4.  

    Dependence-Based Anomaly Detection Methodologies

    D. Yao | NTIS | 2012
    Schlagwörter: Computer security, Cyber security, Network security, System security
  5.  

    Facility Security: Greater Outreach by DHS on Standards and Management Practices Could Benefit Federal Agencies

    NTIS | 2013
    Schlagwörter: Security standards, Physical security programs, Security practices
  6.  

    Independent Assessment of the Afghan National Security Forces

    J. Schroden / C. Norman / J. Meyerle et al. | NTIS | 2014
    Schlagwörter: National security, Security personnel, Ansf(Afghan national security forces)
  7.  

    National Strategy to Secure Cyberspace

    K. T. Schwalm | NTIS | 2006
    Schlagwörter: Security, National security, Information security, Data processing security, Cyber security
  8.  

    Security Engineering

    B. Horowitz | NTIS | 2012
    Schlagwörter: Computer security, Cyber security, System aware security
  9.  

    Summary of Independent Assessment of the Afghan National Security Forces

    J. Schroden / C. Norman / J. Meyerle et al. | NTIS | 2014
    Schlagwörter: National security, Security personnel
  10.  

    Cyber Threat Metrics

    J. Michalski / C. Veitch / M. Mateski et al. | NTIS | 2012
    Schlagwörter: Computer security, Data processing security, Security
  11.  

    Pantex Falling Man - Independent Review Panel Report

    Bertolini L. / Brannon N. / Olsen J. et al. | NTIS | 2014
    Schlagwörter: Consolidated Nuclear Security (CNS), National Nuclear Security Administration (NNSA)
  12.  

    Untying Our Hands: Reconsidering Cyber as a Separate Instrument of National Power

    C. Priechenfried | NTIS | 2017
    Schlagwörter: Cyber security
  13.  

    2011 Biometrics Conference Held in Arlington, Virginia on February 23-24, 2011

    NTIS | 2011
    Schlagwörter: Biometric security, Homeland security, Security personnel
  14.  

    Range Flight Safety Requirements

    C. E. Loftin / S. M. Hudson | NTIS | 2018
    Schlagwörter: Transportation Safety, Flight safety, Range safety, Safety
  15.  

    All the Elements of National Power

    M. Miklaucic | NTIS | 2016
    Schlagwörter: International security
  16.  

    Comprehensive Approach to Improving U.S. Security Force Assistance Efforts

    T. Baginski / B. J. Clark / F. Donovan et al. | NTIS | 2009
    Schlagwörter: National security, Security personnel, Security, Security force assistance
  17.  

    Computing Science: The Robustness of Google CAPTCHAs

    A. S. El Ahmad / J. Yan / M. Tayara | NTIS | 2011
    Schlagwörter: Computer security, Internet security, Security engineering
  18.  

    Security Issues for Cloud Computing

    K. Hamlen / M. Kantarcioglu / L. Khan et al. | NTIS | 2010
    Schlagwörter: Data processing security, Computer network security, Security
  19.  

    Formal Foundations for Hierarchical Safety Cases

    E. Denney / G. Pai / I. Whiteside | NTIS | 2015
    Schlagwörter: Transportation Safety, Safety management, Safety factors, Aircraft safety
  20.  

    Hammer and the Anvil: The Need for A Comprehensive Southwest Border Security Strategy

    J. D. Harris | NTIS | 2010
    Schlagwörter: Border security, Homeland security, National security
  21.  

    Hazardous Materials Transportation: Enhanced Security Requirements

    NTIS | 2009
    Schlagwörter: Transportation Safety, Security requirements, Transportation safety, Security plans, Security assessments, Security measures, Personnel security, Enhanced security requirements, Pipeline and Hazardous Materials Safety Administration (PHMSA), En route security
  22.  

    National Special Security Events

    S. Reese | NTIS | 2009
    Schlagwörter: National security, Homeland security, Security
  23.  

    National Aviation Operational Monitoring Service (NAOMS): A Documentation of the Development of a Survey Methodology

    M. M. Connors / R. Mauro / I. C. Statler | NTIS | 2012
    Schlagwörter: Transportation Safety, Aircraft safety, Flight safety, Safety
  24.  

    Building Global Partnerships: Cooperative Maritime Security Operations as the Most Effective Fire of 21st Century Warfare

    B. Teich / D. M. Houff | NTIS | 2008
    Schlagwörter: National security, Maritime security cooperation, Cooperative security, International security cooperation principles, Theater security cooperation
  25.  

    Concept Development for Software Health Management

    J. Riecks / W. Storm / M. Hollingsworth | NTIS | 2011
    Schlagwörter: Transportation Safety, Aircraft safety, Flight safety, Safety
  26.  

    Improving Safety Culture in Public Transportation

    Roberts H. / Retting R. / Webb T. et al. | NTIS | 2015
    Schlagwörter: Transportation Safety, Transportation safety, Workplace safety, Occupational safety, Safety culture, Safety climate
  27.  

    Homeland Security Science and Technology Directorate Strategic Plan, 2015-2019

    NTIS | 2015
    Schlagwörter: Homeland security, National security, National safety, Cyber security, Security threats
  28.  

    Trafikksikkerhetsvirkninger av Tiltak. (Effects of Road Safety Measures: A Summary for Use in Impact Assessment.)

    A. Hoye / R. Elvik / M. W. J. Sorensen | NTIS | 2011
    Schlagwörter: Transportation Safety, Road safety, Safety measures, Safety benefits
  29.  

    Defense Acquisition Research Journal: Strengthening Cost Consciousness, Professionalism, and Technical Excellence

    R. L. Tremaine / M. Sahinoglu / S. Stockton et al. | NTIS | 2016
    Schlagwörter: Biometric security, National security, Department of homeland security, Computer network security
  30.  

    Visualization Evaluation for Cyber Security: Trends and Future Directions

    D. Staheli / S. Damodaran / T. Yu et al. | NTIS | 2014
    Schlagwörter: Cyber security, Network security, Data security, Visualization for Cyber Security (VizSec)
  31.  

    CHIPS. Volume 29, Issue 1, January - March 2011

    NTIS | 2011
    Schlagwörter: Information security, Social security, Data processing security, Data transmission security, Security, Social security numbers
  32.  

    Using Malware Analysis to Tailor SQUARE for Mobile Platforms

    G. P. Alice / N. R. Mead | NTIS | 2014
    Schlagwörter: COMPUTER SECURITY, ANDROID SECURITY, SECURITY REQUIREMENTS, SQUARE(SECURITY QUALITY REQUIREMENTS ENGINEERING)
  33.  

    Computer Security Division Annual Report, 2013

    NTIS | 2014
    Schlagwörter: Computer security, Automated security tools, Cyber security, Computer Security Division(CSD)
  34.  

    Computer Security Division Annual Report, 2014

    NTIS | 2015
    Schlagwörter: Computer security, Automated security tools, Cyber security, Computer Security Division(CSD)
  35.  

    Legal Issues Related to Developing Safety Management Systems and Safety Risk Management at U.S. Airports. Legal Research Digest 19

    D. Y. Bannard | NTIS | 2013
    Schlagwörter: Transportation Safety, Aviation safety, Safety management systems, Safety risk management, Safety assessments, Safety Management System(SMS)
  36.  

    Do Households Have Enough Wealth for Retirement

    D. A. Love / P. A. Smith / L. C. McNair | NTIS | 2007
    Schlagwörter: Retirement security, Social Security
  37.  

    Were the Afghan National Security Forces Successful in 2013

    J. Schroden / P. Asfura-Heim / C. Norman et al. | NTIS | 2014
    Schlagwörter: National security, Security personnel, Afghan national security forces
  38.  

    Curriculum Modules in Support of Tabletop Cybersecurity Games

    J. C. Coria | NTIS | 2013
    Schlagwörter: Hacking(Computer security), Cyber security education, Non-digital computer security games, Cyber security concepts
  39.  

    Regional Security in the Middle East and the Jordanian Role in it

    F. Al-Dwairi | NTIS | 2001
    Schlagwörter: National security, Regional security, Psychological security, Physical security
  40.  

    Numbers Matter: Post-2014 Afghan National Security Force End Strength

    J. W. Leffers | NTIS | 2013
    Schlagwörter: National security, Security personnel, International security assistance force
  41.  

    Computer Security Division Annual Report, 2012

    NTIS | 2013
    Schlagwörter: Computer security, Automated security tools, Cyber security, Computer Security Division(CSD)
  42.  

    Overcoming the Illusion of Security: Creating a New Spacefaring Security Strategy Paradigm

    D. M. Githens | NTIS | 2014
    Schlagwörter: Security, Spacefaring security, Space security
  43.  

    Solving the Cross-Domain Conundrum

    B. F. Koelsch | NTIS | 2013
    Schlagwörter: National security, Multilevel security, Multiple security levels
  44.  

    Whats Wrong With Your PUF Obstacles to Successful Hardware Security Research

    A. I. J. Brown / S. G. Fazzari | NTIS | 2017
    Schlagwörter: Hardware Security Research
  45.  

    Cyber Workforce Retention

    W. E. Parker IV | NTIS | 2016
    Schlagwörter: Information security
  46.  

    Global Security Contingency Fund (GSCG): Summary and Issue Overview

    N. M. Serafino | NTIS | 2012
    Schlagwörter: Security, Global security, Security efforts, Global Security Contingency Fund (GSCF)
  47.  

    Guide for Developing Security Plans for Federal Information Systems. Information Security

    M. Swanson / J. Hash / P. Bowen | NTIS | 2006
    Schlagwörter: Information security, Computer security, Security plans, Security requirements, System security planning
  48.  

    Formal Models of Composable Security Architectures

    D. E. Rodriguez | NTIS | 2012
    Schlagwörter: Information security, Computer network security, Security architectures, Information-flow security

Ergebnisse anzeigen: 10 | 20 | 50