Seite 1 von 195.121 Ergebnissen

Sortieren nach: Relevanz | Aktualität | Titel

Treffer filtern

Externe Quellen


Für folgende Begriffe wurden Synonyme verwendet: Sicherheit

Suche ohne Synonyme: keywords:(Sicherheit)

Verwendete Synonyme:

  • safety
  • security

    Information security management in SOCs and SICs

    Miloslavskaya, Natalia | IOS Press | 2018
    Schlagwörter: Information security, information security incident, information security management, Security Operations Center, Security Intelligence Center

    Estimating influence of threat using Misuse Case Oriented Quality Requirements (MCOQR) metrics: Security requirements engineering perspective

    Banerjee, Chitresh / Banerjee, Arpita / Sharma, S.K. | IOS Press | 2017
    Schlagwörter: Security, software security, security metrics, software security metrics, security requirements engineering

    A study on cloud security issues

    Prathyusha, Damai Jessica / Naseera, Shaik | IOS Press | 2017
    Schlagwörter: Cloud security, security threats, security precautions

    2017 Emerging Technology Domains Risk Survey

    D. Klinedinst / J. Land / K. O'Meara | NTIS | 2017
    Schlagwörter: Information security, Homeland Security

    Automated analysis of security protocols with global state

    Kremer, Steve / Künnemann, Robert | IOS Press | 2016
    Schlagwörter: stateful security protocols, security APIs

    Towards a cryptographic treatment of publish/subscribe systems1

    Yuen, Tsz Hon / Susilo, Willy / Mu, Yi | IOS Press | 2014
    Schlagwörter: cryptographic security model, security proofs

    Exploring information security compliance in corporate IT governance

    IOS Press | 2009
    Schlagwörter: Information security management, security

    Security Engineering Project

    B. Horowitz | NTIS | 2012
    Schlagwörter: Computer security, Information security, Cyber security, System aware security

    Dependence-Based Anomaly Detection Methodologies

    D. Yao | NTIS | 2012
    Schlagwörter: Computer security, Cyber security, Network security, System security

    Adapting an Agent-Based Model of Socio-Technical Systems to Analyze Security Failures

    A. Roque / C. Cunningham | NTIS | 2016
    Schlagwörter: Security failures, Security, Cyber security

    A catalogue associating security patterns and attack steps to design secure applications

    Salva, Sébastien / Regainia, Loukmen | IOS Press | 2018
    Schlagwörter: security patterns, security principles

    Independent Assessment of the Afghan National Security Forces

    J. Schroden / C. Norman / J. Meyerle et al. | NTIS | 2014
    Schlagwörter: National security, Security personnel, Ansf(Afghan national security forces)

    TripleMon: A multi-layer security framework for mediating inter-process communication on Android

    Jing, Yiming / Ahn, Gail-Joon / Hu, Hongxin et al. | IOS Press | 2016
    Schlagwörter: Mobile security, system security

    From qualitative to quantitative proofs of security properties using first-order conditional logic1

    Halpern, Joseph Y. | IOS Press | 2016
    Schlagwörter: Qualitative security, quantitative security

    Facility Security: Greater Outreach by DHS on Standards and Management Practices Could Benefit Federal Agencies

    NTIS | 2013
    Schlagwörter: Security standards, Physical security programs, Security practices

    An extended study on addressing defender teamwork while accounting for uncertainty in attacker defender games using iterative Dec-MDPs

    Shieh, Eric / Jiang, Albert Xin / Yadav, Amulya et al. | IOS Press | 2015
    Schlagwörter: security, security games

    Symbolic universal composability

    Böhl, Florian / Unruh, Dominique | IOS Press | 2014
    Schlagwörter: Symbolic security models, security definitions

    Security Engineering

    B. Horowitz | NTIS | 2012
    Schlagwörter: Computer security, Cyber security, System aware security

    National Strategy to Secure Cyberspace

    K. T. Schwalm | NTIS | 2006
    Schlagwörter: Security, National security, Information security, Data processing security, Cyber security

Ergebnisse anzeigen: 10 | 20 | 50