Year of publication
Type of media
Source
Subject
- ‹ All subjects
- Mathematics (23,060)
- Computer Science (10,891)
- Engineering (2,228)
- Medicine (2,127)
- Physics (1,721)
- Economics (1,446)
- Electrical engineering (1,380)
- Educational Science (1,240)
- Traffic engineering (849)
- Mechanical engineering, energy technology (330)
- Life Sciences (324)
- Medical technology (252)
- Chemistry (209)
- Chemical and environmental engineering (126)
- Civil engineering (104)
- Material science (101)
- Social Sciences (97)
- Other subjects (87)
- Earth Sciences (49)
- Mining (32)
- Architecture (23)
- Law (15)
- Sports Science (10)
- Philosophy (6)
- Horticulture (3)
- Literature Studies (3)
- History (1)
- Linguistics (1)
- Study of religions (1)
Type of material
TIB reading rooms collection
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Challenges and performance metrics for security operations center analysts: a systematic review
Taylor & Francis Verlag | 2020|Keywords: Security operations center, cyber security, security analysts -
Risk management-based security evaluation model for telemedicine systems
Free accessDOAJ | 2020|Keywords: Telemedicine security, Medical information security, Smart medical security, Telecare security -
Bayesian Stackelberg games for cyber-security decision support
Elsevier | 2021|Keywords: Cyber-security, Security games, Security investment -
Design Considerations for Building Credible Security Testbeds: Perspectives from Industrial Control System Use Cases
Taylor & Francis Verlag | 2021|Keywords: security simulations, security modelling, cyber security simulations -
On the design of secure primitives for real world applications
Elsevier | 2020|Keywords: Hardware security, Systems security, Security engineering, Computers and networks security -
Securing state reconstruction under sensor and actuator attacks: Theory and design
Elsevier | 2020|Keywords: Cyber–physical security, Security monitoring -
Digital transformation and challenges to data security and privacy
TIBKAT | 2021|Keywords: Database security, Computer security ; fast, Computer security, Database security ; fast -
A parallel image encryption algorithm based on the piecewise linear chaotic map and hyper-chaotic map
Online Contents | 2018|Keywords: Image security, Security analysis -
Decision support for selecting information security controls
Taylor & Francis Verlag | 2018|Keywords: Information security, security controls, optimisation of security portfolio -
A parallel image encryption algorithm based on the piecewise linear chaotic map and hyper-chaotic map
Online Contents | 2018|Keywords: Image security, Security analysis -
CAAVI-RICS model for observing the security of distributed IoT and edge computing systems
Elsevier | 2020|Keywords: Cyber-security, Distributed security -
Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
Elsevier | 2009|Keywords: Information security, End-user security behaviors, Security policy compliance -
Security versus convenience? An experimental study of user misperceptions of wireless internet service quality
Elsevier | 2011|Keywords: Information security, Security/convenience tradeoff, Security engineering -
Information security management in SOCs and SICs
IOS Press | 2018|Keywords: Information security, information security management, Security Operations Center, Security Intelligence Center, information security incident -
Scientific and Methodological Approach to Assessing the Level of Banks’ Financial Security
Springer Verlag | 2020|Keywords: Financial security, Financial security components, Security of deposit transactions, Security of credit transactions, Security of cash transactions, Security of investment transactions, Security of currency transactions, A financial security indicator, Level of financial security -
Strengthening Safety Compliance in Nuclear Power Operations: A Role‐Based Approach
Wiley | 2014|Keywords: nuclear safety, safety performance, safety procedures -
Examining Factors that Influence the Existence of Heinrich's Safety Triangle Using Site‐Specific H&S Data from More than 25,000 Establishments
Wiley | 2018|Keywords: safety pyramid, safety triangle -
Not all areas are equal: analysis of citations in information security research
Online Contents | 2019|Keywords: Information security, Science of security, Cyber security -
Machine learning-enhanced hybrid cryptography and image steganography algorithm for securing cloud data
IOS Press | 2024|Keywords: Data security, security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.