Skip to search formSkip to main contentSkip to account menu

Defense in depth (computing)

Known as: DID, Layered approach, Security-in-depth 
Defense in Depth (also known as Castle Approach) is an information assurance (IA) concept in which multiple layers of security controls (defense) are… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
A major concern for deployment of location-based mobile systems is the ill-usage of mobile client's location data, which may… 
2009
2009
Cyberterrorism has become one of the most significant threats to the national and international security of the modern state, and… 
2008
2008
This paper presents a framework to achieve an efficient dynamic and decentralized spectrum and radio resource usage in… 
2002
2002
The right of citizens to high-quality e-Government services makes one-stop service offerings an essential feature for e… 
1997
1997
This paper presents an object-based layered video coding scheme which achieves very high compression efficiency along with the… 
1993
1993
Showing that concurrent systems satisfy timing constraints on their behavior is difficult, but may be essential for critical… 
1992
1992
P ROLOG, the most popular logic programming language, has been developed for single-processor computers. The implementations of… 
Highly Cited
1992
Highly Cited
1992
A layered approach to the specification and verification of real-time systems is described. Application processes are specified…