Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,399,328 papers from all fields of science
Search
Sign In
Create Free Account
Cyber security standards
Known as:
Cyber security certification
, ISA 99
, ISA99
Cybersecurity standards (also styled cyber security standards) are techniques generally set forth in published materials that attempt to protect the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
30 relations
201 CMR 17.00
BS 7799
Backoff
Common Criteria
Expand
Broader (1)
Cyberwarfare
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2018
Review
2018
Inferring Ontology Fragments from Semantic Role Typing of Lexical Variants
M. Hosseini
,
T. Breaux
,
Jianwei Niu
Requirements Engineering: Foundation for Software…
2018
Corpus ID: 3611081
[Context and Motivation] Information systems depend on personal data to individualize services. To manage privacy expectations…
Expand
2018
2018
Computer Simulation of Discrete Human-Machine Interaction for Providing Reliability and Cybersecurity of Critical Systems
E. Lavrov
,
A. Volosiuk
,
N. Pasko
,
Vitaliy Gonchar
,
G. Kozhevnikov
Third International Conference on Human Factors…
2018
Corpus ID: 52127585
The article considers the issues of preventing damage to complex critical systems, caused by cybersecurity unreliability and…
Expand
Review
2017
Review
2017
Cybersecurity Automated Information Extraction Techniques: Drawbacks of Current Methods, and Enhanced Extractors
R. A. Bridges
,
Kelly M. T. Huffer
,
Corinne L. Jones
,
Michael D. Iannacone
,
J. Goodall
International Conference on Machine Learning and…
2017
Corpus ID: 24696040
We address a crucial element of applied information extraction—accurate identification of basic security entities in text-—by…
Expand
2016
2016
The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations
B. Buchanan
2016
Corpus ID: 158986874
2016
2016
Cybersecurity best practices for creating resilient control systems
J. Smith
,
Joshua Pereyda
,
Dennis Gammel
IEEE Radio and Wireless Symposium
2016
Corpus ID: 44613696
Control systems manage the automated systems that run our world. The security of these systems is critical, but most modern best…
Expand
2015
2015
A Value Blueprint Approach to Cybersecurity in Networked Medical Devices
George Tanev
,
Peyo Tzolov
,
Rollins Apiafi
2015
Corpus ID: 55363260
Cybersecurity for networked medical devices has been usually “bolted on” by manufacturers at the end of the design cycle, rather…
Expand
2015
2015
Meeting the Cybersecurity Challenge
S. Donaldson
,
S. Siegel
,
Chris Williams
,
Abdul Aslam
2015
Corpus ID: 110953029
Chapter 1 discussed the challenges facing today's cyberdefenders. So how does an enterprise successfully defend itself against…
Expand
2013
2013
Fiddling on the Roof: Recent Developments in Cybersecurity
Melanie Teplinsky
2013
Corpus ID: 107766921
INTRODUCTION[Y]ou might say every one of us is a fiddler on the roof trying to scratch out a pleasant, simple tune without…
Expand
Review
2011
Review
2011
Cybersecurity: Public Sector Threats and Responses
K. Andreasson
2011
Corpus ID: 150725976
The Internet has given rise to new opportunities for the public sector to improve efficiency and better serve constituents in the…
Expand
2009
2009
Comprehensive National Cybersecurity Initiative: Legal Authorities and Policy Considerations
J. Rollins
,
A. Henning
2009
Corpus ID: 150906657
This report discusses the legal issues and addresses policy considerations related to the Comprehensive National Cybersecurity…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE