Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,280,623 papers from all fields of science
Search
Sign In
Create Free Account
Defense in depth (computing)
Known as:
DID
, Layered approach
, Security-in-depth
Defense in Depth (also known as Castle Approach) is an information assurance (IA) concept in which multiple layers of security controls (defense) are…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
23 relations
Authentication
Biometrics
Computer security
DMZ (computing)
Expand
Broader (1)
Data security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
Global privacy and transportation mode homogeneity anonymization in location based mobile systems with continuous queries
Leon Stenneth
,
Philip S. Yu
International Conference on Collaborative…
2010
Corpus ID: 7526533
A major concern for deployment of location-based mobile systems is the ill-usage of mobile client's location data, which may…
Expand
2009
2009
Cyber-Apocalypse Now: Securing the Internet Against Cyberterrorism and Using Universal Jurisdiction as a Deterrent
K. Gable
2009
Corpus ID: 153999055
Cyberterrorism has become one of the most significant threats to the national and international security of the modern state, and…
Expand
2008
2008
Decentralized spectrum and radio resource management enabled by an on-demand Cognitive Pilot Channel
O. Sallent
,
R. Agustí
,
J. Pérez-Romero
,
L. Giupponi
Ann. des Télécommunications
2008
Corpus ID: 6297877
This paper presents a framework to achieve an efficient dynamic and decentralized spectrum and radio resource usage in…
Expand
Highly Cited
2003
Highly Cited
2003
UNIVERSITY OF CALIFORNIA Los Angeles Framework for Developing Adaptable Applications in Pervasive Environments A thesis submitted in partial satisfaction of the requirements for the degree Master of…
Shantanu Bhattacharyya
,
R. Muntz
,
Stott Parker
,
R. Bagrodia
,
Peter Reiher
2003
Corpus ID: 236164613
2002
2002
An Approach to Offering One-Stop e-Government Services - Available Technologies and Architectural Issues
D. Gouscos
,
G. Laskaridis
,
Dimitris Lioulias
,
G. Mentzas
,
P. Georgiadis
International Conference on Electronic Government
2002
Corpus ID: 424703
The right of citizens to high-quality e-Government services makes one-stop service offerings an essential feature for e…
Expand
1997
1997
Functional coding of video using a shape-adaptive DCT algorithm and an object-based motion prediction toolbox
P. Kauff
,
Bela Makai
,
S. Rauthenberg
,
U. Goelz
,
J. Lameillieure
,
T. Sikora
IEEE Trans. Circuits Syst. Video Technol.
1997
Corpus ID: 9794134
This paper presents an object-based layered video coding scheme which achieves very high compression efficiency along with the…
Expand
1993
1993
A practical technique for bounding the time between events in concurrent real-time systems
J. Corbett
,
G. Avrunin
International Symposium on Software Testing and…
1993
Corpus ID: 1916146
Showing that concurrent systems satisfy timing constraints on their behavior is difficult, but may be essential for critical…
Expand
1992
1992
A High Performance OR-parallel Prolog System
R. Karlsson
1992
Corpus ID: 59822203
P ROLOG, the most popular logic programming language, has been developed for single-processor computers. The implementations of…
Expand
Highly Cited
1992
Highly Cited
1992
A Layered Approach to Automating the Verification of Real-Time Systems
R. Gerber
,
Insup Lee
IEEE Trans. Software Eng.
1992
Corpus ID: 7846748
A layered approach to the specification and verification of real-time systems is described. Application processes are specified…
Expand
Highly Cited
1988
Highly Cited
1988
A high accuracy algorithm for recognition of handwritten numerals
G. Baptista
,
K. Kulkarni
Pattern Recognition
1988
Corpus ID: 33668488
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required