Year of publication
Type of media
Source
Subject
- ‹ All subjects
- Computer Science (171,926)
- Educational Science (34,185)
- Electrical engineering (17,540)
- Mathematics (10,710)
- Engineering (6,987)
- Economics (5,047)
- Physics (2,371)
- Traffic engineering (1,241)
- Other subjects (1,047)
- Law (1,046)
- Social Sciences (863)
- Mechanical engineering, energy technology (678)
- Chemical and environmental engineering (580)
- Medicine (373)
- Chemistry (367)
- Medical technology (249)
- Life Sciences (178)
- Architecture (114)
- Civil engineering (114)
- Earth Sciences (79)
- Linguistics (50)
- Material science (49)
- Philosophy (42)
- Literature Studies (40)
- Mining (36)
- Horticulture (15)
- History (13)
- Sports Science (4)
Type of material
Licence
TIB reading rooms collection
LUH institutes collection
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
A Survey on Systems Security Metrics
Online Contents | 2017|Keywords: quantitative security, Security metrics, security foundation, security measurement -
The design of phishing studies: Challenges for researchers
Elsevier | 2015|Keywords: Information security, Security behaviours, Email security, Security training -
Novel efficient techniques for real-time cloud security assessment
Elsevier | 2016|Keywords: Cloud security, Security quantification, Security evaluation, Security level agreements, Security metrics -
Security threats to critical infrastructure: the human factor
Free accessOnline Contents | 2018|Keywords: Security awareness, Cyber security training, Security threats against critical infrastructure, Critical infrastructure security, Work-based security training -
The Human Aspects of Information Security Questionnaire (HAIS-Q): Two further validation studies
Elsevier | 2017|Keywords: Information security (InfoSec), Security behaviours, Cyber security, Information security awareness (ISA) -
Practical Covertly Secure MPC for Dishonest Majority - Or: Breaking the SPDZ Limits
Tema Archive | 2013|Keywords: Sicherheit, aktive Sicherheit, beweisbare Sicherheit -
From information security to cyber security
Elsevier | 2013|Keywords: Information security, Cyber security, Cyber-Security, Computer security -
The significance of securing as a critical component of information security: An Australian narrative
Elsevier | 2019|Keywords: Security studies, Usable security, Information security messaging, Ontological security, Information security management -
Cyber ranges and security testbeds: Scenarios, functions, tools and architecture
Elsevier | 2019|Keywords: Security testbed, Cyber security, Security exercise -
A comprehensive model of information security factors for decision-makers
Elsevier | 2020|Keywords: Key Security Indicators, Security Success, Security Model, Security Management Decision-Making -
“Security begins at home”: Determinants of home computer and mobile device security behavior
Elsevier | 2017|Keywords: Behavioral IS security, Information security, Mobile device security, Home computer security -
SIEM-based framework for security controls automation
Emerald Group Publishing | 2012|Keywords: Data security, Computer security, Security information and event management, Information security management, Security automation -
More than the individual: Examining the relationship between culture and Information Security Awareness
Elsevier | 2019|Keywords: Security culture, Information Security Awareness (ISA), Information Security (InfoSec), Cyber security -
Enabling security functions with SDN: A feasibility study
Elsevier | 2015|Keywords: Network security, Software-defined networking security, SDN security -
Security threats to critical infrastructure: the human factor
Online Contents | 2018|Keywords: Security awareness, Cyber security training, Security threats against critical infrastructure, Critical infrastructure security, Work-based security training -
Security-related behavior in using information systems in the workplace: A review and synthesis
Elsevier | 2012|Keywords: Information security, Security-related behavior, Security assurance behavior, Security risk-taking behavior, Security damaging behavior, Security violation -
A novel Security-by-Design methodology: Modeling and assessing security by SLAs with a quantitative approach
Elsevier | 2020|Keywords: Security-by-Design methodologies, Security Service Level Agreement, Security metrics, Security models, Security Assessment -
Cloud security issues and challenges: A survey
Elsevier | 2016|Keywords: Cloud security, Cloud security challenges, Cloud security issues -
Survey on cyberspace security
Online Contents | 2015|Keywords: information security, information system security, cyberspace security, network security, information content security -
Information security policy noncompliance: An integrative social influence model
Wiley | 2020|Keywords: information security management, IS Security, security policy violation
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.