Skip to search formSkip to main contentSkip to account menu

Defense in depth (computing)

Known as: DID, Layered approach, Security-in-depth 
Defense in Depth (also known as Castle Approach) is an information assurance (IA) concept in which multiple layers of security controls (defense) are… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
At a time of economic turmoil it is perhaps unsurprising that the minds of policy makers focus on the question of how to restart… 
Highly Cited
2010
Highly Cited
2010
In this paper, we propose a new quality link metric, interference and bandwidth adjusted ETX (IBETX) for wireless multi-hop… 
2009
2009
Cyberterrorism has become one of the most significant threats to the national and international security of the modern state, and… 
2005
2005
We describe a fibre-optic hydrophone array system architecture that can be tailored to meet the underwater acoustic surveillance… 
2002
2002
The right of citizens to high-quality e-Government services makes one-stop service offerings an essential feature for e… 
1997
1997
This paper presents an object-based layered video coding scheme which achieves very high compression efficiency along with the… 
1992
1992
P ROLOG, the most popular logic programming language, has been developed for single-processor computers. The implementations of… 
Highly Cited
1992
Highly Cited
1992
A layered approach to the specification and verification of real-time systems is described. Application processes are specified…