Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,311 papers from all fields of science
Search
Sign In
Create Free Account
Defense in depth (computing)
Known as:
DID
, Layered approach
, Security-in-depth
Defense in Depth (also known as Castle Approach) is an information assurance (IA) concept in which multiple layers of security controls (defense) are…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
23 relations
Authentication
Biometrics
Computer security
DMZ (computing)
Expand
Broader (1)
Data security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
Shifting the Dial: From wellbeing measures to policy practice
Jennifer Wallace
,
Katie Schmuecker
2012
Corpus ID: 56447014
At a time of economic turmoil it is perhaps unsurprising that the minds of policy makers focus on the question of how to restart…
Expand
Highly Cited
2010
Highly Cited
2010
Interference and bandwidth adjusted ETX in wireless multi-hop networks
N. Javaid
,
A. Bibi
,
Karim D Djouani
IEEE Globecom Workshops
2010
Corpus ID: 7615605
In this paper, we propose a new quality link metric, interference and bandwidth adjusted ETX (IBETX) for wireless multi-hop…
Expand
2009
2009
Cyber-Apocalypse Now: Securing the Internet Against Cyberterrorism and Using Universal Jurisdiction as a Deterrent
K. Gable
2009
Corpus ID: 153999055
Cyberterrorism has become one of the most significant threats to the national and international security of the modern state, and…
Expand
2005
2005
Fiber-optic hydrophone array for acoustic surveillance in the littoral
D. Hill
,
P. J. Nash
SPIE Defense + Commercial Sensing
2005
Corpus ID: 109218779
We describe a fibre-optic hydrophone array system architecture that can be tailored to meet the underwater acoustic surveillance…
Expand
Highly Cited
2003
Highly Cited
2003
UNIVERSITY OF CALIFORNIA Los Angeles Framework for Developing Adaptable Applications in Pervasive Environments A thesis submitted in partial satisfaction of the requirements for the degree Master of…
Shantanu Bhattacharyya
,
R. Muntz
,
Stott Parker
,
R. Bagrodia
,
Peter Reiher
2003
Corpus ID: 236164613
2002
2002
An Approach to Offering One-Stop e-Government Services - Available Technologies and Architectural Issues
D. Gouscos
,
G. Laskaridis
,
Dimitris Lioulias
,
G. Mentzas
,
P. Georgiadis
International Conference on Electronic Government
2002
Corpus ID: 424703
The right of citizens to high-quality e-Government services makes one-stop service offerings an essential feature for e…
Expand
1997
1997
Functional coding of video using a shape-adaptive DCT algorithm and an object-based motion prediction toolbox
P. Kauff
,
Bela Makai
,
S. Rauthenberg
,
U. Goelz
,
J. Lameillieure
,
T. Sikora
IEEE Trans. Circuits Syst. Video Technol.
1997
Corpus ID: 9794134
This paper presents an object-based layered video coding scheme which achieves very high compression efficiency along with the…
Expand
1992
1992
A High Performance OR-parallel Prolog System
R. Karlsson
1992
Corpus ID: 59822203
P ROLOG, the most popular logic programming language, has been developed for single-processor computers. The implementations of…
Expand
Highly Cited
1992
Highly Cited
1992
A Layered Approach to Automating the Verification of Real-Time Systems
R. Gerber
,
Insup Lee
IEEE Trans. Software Eng.
1992
Corpus ID: 7846748
A layered approach to the specification and verification of real-time systems is described. Application processes are specified…
Expand
Highly Cited
1988
Highly Cited
1988
A high accuracy algorithm for recognition of handwritten numerals
G. Baptista
,
K. Kulkarni
Pattern Recognition
1988
Corpus ID: 33668488
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE