Seite 1 von 195.121 Ergebnissen

Sortieren nach: Relevanz | Aktualität | Titel

Treffer filtern

Externe Quellen

Suchen...

Für folgende Begriffe wurden Synonyme verwendet: Sicherheit

Suche ohne Synonyme: keywords:(Sicherheit)

Verwendete Synonyme:

  • safety
  • security
  1.  

    Information security management in SOCs and SICs

    Miloslavskaya, Natalia | IOS Press | 2018
    Schlagwörter: Information security, information security incident, information security management, Security Operations Center, Security Intelligence Center
  2.  

    Estimating influence of threat using Misuse Case Oriented Quality Requirements (MCOQR) metrics: Security requirements engineering perspective

    Banerjee, Chitresh / Banerjee, Arpita / Sharma, S.K. | IOS Press | 2017
    Schlagwörter: Security, software security, security metrics, software security metrics, security requirements engineering
  3.  

    A study on cloud security issues

    Prathyusha, Damai Jessica / Naseera, Shaik | IOS Press | 2017
    Schlagwörter: Cloud security, security threats, security precautions
  4.  

    2017 Emerging Technology Domains Risk Survey

    D. Klinedinst / J. Land / K. O'Meara | NTIS | 2017
    Schlagwörter: Information security, Homeland Security
  5.  

    Automated analysis of security protocols with global state

    Kremer, Steve / Künnemann, Robert | IOS Press | 2016
    Schlagwörter: stateful security protocols, security APIs
  6.  

    Towards a cryptographic treatment of publish/subscribe systems1

    Yuen, Tsz Hon / Susilo, Willy / Mu, Yi | IOS Press | 2014
    Schlagwörter: cryptographic security model, security proofs
  7.  

    Exploring information security compliance in corporate IT governance

    IOS Press | 2009
    Schlagwörter: Information security management, security
  8.  

    Security Engineering Project

    B. Horowitz | NTIS | 2012
    Schlagwörter: Computer security, Information security, Cyber security, System aware security
  9.  

    Dependence-Based Anomaly Detection Methodologies

    D. Yao | NTIS | 2012
    Schlagwörter: Computer security, Cyber security, Network security, System security
  10.  

    Adapting an Agent-Based Model of Socio-Technical Systems to Analyze Security Failures

    A. Roque / C. Cunningham | NTIS | 2016
    Schlagwörter: Security failures, Security, Cyber security
  11.  

    A catalogue associating security patterns and attack steps to design secure applications

    Salva, Sébastien / Regainia, Loukmen | IOS Press | 2018
    Schlagwörter: security patterns, security principles
  12.  

    Independent Assessment of the Afghan National Security Forces

    J. Schroden / C. Norman / J. Meyerle et al. | NTIS | 2014
    Schlagwörter: National security, Security personnel, Ansf(Afghan national security forces)
  13.  

    TripleMon: A multi-layer security framework for mediating inter-process communication on Android

    Jing, Yiming / Ahn, Gail-Joon / Hu, Hongxin et al. | IOS Press | 2016
    Schlagwörter: Mobile security, system security
  14.  

    From qualitative to quantitative proofs of security properties using first-order conditional logic1

    Halpern, Joseph Y. | IOS Press | 2016
    Schlagwörter: Qualitative security, quantitative security
  15.  

    Facility Security: Greater Outreach by DHS on Standards and Management Practices Could Benefit Federal Agencies

    NTIS | 2013
    Schlagwörter: Security standards, Physical security programs, Security practices
  16.  

    An extended study on addressing defender teamwork while accounting for uncertainty in attacker defender games using iterative Dec-MDPs

    Shieh, Eric / Jiang, Albert Xin / Yadav, Amulya et al. | IOS Press | 2015
    Schlagwörter: security, security games
  17.  

    Symbolic universal composability

    Böhl, Florian / Unruh, Dominique | IOS Press | 2014
    Schlagwörter: Symbolic security models, security definitions
  18.  

    Security Engineering

    B. Horowitz | NTIS | 2012
    Schlagwörter: Computer security, Cyber security, System aware security
  19.  

    National Strategy to Secure Cyberspace

    K. T. Schwalm | NTIS | 2006
    Schlagwörter: Security, National security, Information security, Data processing security, Cyber security

Ergebnisse anzeigen: 10 | 20 | 50