Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 221,755,764 papers from all fields of science
Search
Sign In
Create Free Account
Computer security
Known as:
Computer security and identity theft
, Compsec
, Cyber security expert
Expand
Computer security, also known as cyber security or IT security, is the protection of information systems from theft or damage to the hardware, the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Aircraft Communications Addressing and Reporting System
Anti-worm
Arbitrary code execution
Backup
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
An Assessment of The Department of Defense Strategy for Operating In Cyberspace
Thomas M. Chen
2014
Corpus ID: 107883768
Abstract : In some ways, the cyber domain is quite different from the traditional operational domains of air, land, sea, and…
Expand
Highly Cited
2012
Highly Cited
2012
Secure communication for smart IoT objects: Protocol stacks, use cases and practical examples
Riccardo Bonetto
,
N. Bui
,
V. Lakkundi
,
Alexis Olivereau
,
A. Serbanati
,
M. Rossi
IEEE International Symposium on a World of…
2012
Corpus ID: 206871937
In this paper we discuss security procedures for constrained IoT devices. We start with the description of a general security…
Expand
Highly Cited
2010
Highly Cited
2010
A Trust System Architecture for SCADA Network Security
Gregory M. Coates
,
Kenneth M. Hopkinson
,
Scott Graham
,
S. Kurkowski
IEEE Transactions on Power Delivery
2010
Corpus ID: 24576793
This paper discusses the use of a communications network security device, called a trust system, to enhance supervisory control…
Expand
Highly Cited
2009
Highly Cited
2009
Power System Risk Assessment and Control in a Multiobjective Framework
F. Xiao
,
J. McCalley
IEEE Transactions on Power Systems
2009
Corpus ID: 44669875
Traditional online security assessment determines whether the system is secure or not, but how secure or insecure is not…
Expand
Highly Cited
2005
Highly Cited
2005
Industrial cybersecurity for power system and SCADA networks
A. Creery
,
E. Byres
Record of Conference Papers Industry Applications…
2005
Corpus ID: 18922785
Many automation and modernization programs are now employing Intranet/Internet technologies in industrial control strategies. The…
Expand
Highly Cited
2005
Highly Cited
2005
Impact of large scale wind power on power system stability
C. Eping
,
H. Müller
,
M. Pöller
,
J. Stenzel
2005
Corpus ID: 1376731
The amount of wind power constantly increased during recent years requiring detailed analysis about the impact of wind power on…
Expand
Highly Cited
2004
Highly Cited
2004
Personalised cryptographic key generation based on FaceHashing
A. Teoh
,
D. Ngo
,
A. Goh
Computers & security
2004
Corpus ID: 8286447
Highly Cited
2004
Highly Cited
2004
An introduction to access security in UMTS
G. M. Køien
IEEE wireless communications
2004
Corpus ID: 1867959
The first generation of cellular mobile communications systems contained few if any security measures to protect the system…
Expand
Highly Cited
2003
Highly Cited
2003
Cryptanalysis of a modified remote user authentication scheme using smart cards
K. Leung
,
Lee-Ming Cheng
,
A. Fong
,
Chi-Kwong Chan
IEEE Trans. Consumer Electron.
2003
Corpus ID: 206631417
In this paper, the security of a modified remote user authentication scheme proposed by Shen, Lin, and Hwang is analyzed. We show…
Expand
Highly Cited
2000
Highly Cited
2000
Auditing Boolean attributes
J. Kleinberg
,
C. Papadimitriou
,
P. Raghavan
ACM SIGACT-SIGMOD-SIGART Symposium on Principles…
2000
Corpus ID: 5098396
We study the problem of auditing databases which support statistical sum queries to protect the security of sensitive information…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required