Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,151,384 papers from all fields of science
Search
Sign In
Create Free Account
ITSEC
Known as:
Information Technology Security Evaluation Criteria
The Information Technology Security Evaluation Criteria (ITSEC) is a structured set of criteria for evaluating computer security within products and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Common Criteria
Interactive Link
Jim Woodcock
Mondex
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Efficient Implementation of Simulation Support for Tactical-Level Military Training
J. Brynielsson
,
Sinna Lindquist
,
L. Luotsinen
2016
Corpus ID: 16793156
Computer-based games and simulations provide the means for practicing essential elements of combat which in a realistic exercise…
Expand
2016
2016
Augmented reality - A tool for improvement in the manufacturing industry
Tobias Danielsson
,
D. Eriksson
2016
Corpus ID: 55082405
The globalisation of the manufacturing industry leads to higher demands on quality, time and flexibility in production. Augmented…
Expand
2016
2016
Improving the Emergency Manager's Hurricane Evacuation Decision Making Through Serious Gaming
H. Reynolds
,
M. Perlman
,
D. Wilson
2016
Corpus ID: 168802739
Making an evacuation decision in response to a hurricane is a high-impact event that directly affects public safety on a large…
Expand
2010
2010
Cross Domain Rule Set Verification Tools and Process Improvements
L. Call
,
Charles McElveen
,
Martin Liedy
,
K. Djahandari
2010
Corpus ID: 108000121
Abstract : In the Team Mission Training Environment, the primary training goal is to promote pilot and crew station readiness…
Expand
2009
2009
LoI: Efficient relevance evaluation and filtering for distributed simulation
Zhong Zhou
,
Wei Wu
Science in China Series F: Information Sciences
2009
Corpus ID: 3464368
In large-scale distributed simulation, thousands of objects keep moving and interacting in a virtual environment, which produces…
Expand
2009
2009
A bio-inspired group evasion behavior
Sang Woo Lee
2009
Corpus ID: 17630026
Group evasion behavior is the evasion pattern of numerous agents, one kind of the most frequently observed behavior patterns in…
Expand
2008
2008
Accelerating Line-of-Sight Computations in Large OneSAF Terrains with Dynamic Events
C. Lauterbach
,
Ming C Lin
,
+4 authors
M. Bauer
2008
Corpus ID: 15477863
We describe novel algorithms to accelerate the performance of line-of-sight (LOS) computations in large terrains with dynamic…
Expand
2007
2007
Aurora: A Multi-Agent Prototype Modelling Crew Interpersonal Communication Network
D. Gagné
,
G. Nault
,
Alain Garant
,
J. Desbiens
2007
Corpus ID: 17216513
universally being identified from many different occupations (e.g. civil aviation, military, etc.). Our research in Distributed…
Expand
2001
2001
SPARK — a state-of-the-practice approach to the Common Criteria implementation requirements
R. Chapman
2001
Corpus ID: 11527841
The Common Criteria (CC) require the use of programming languages whose statements have an "unambiguous meaning." This…
Expand
1996
1996
Formal techniques for an ITSEC-E4 secure gateway
P. Bieber
Proceedings 12th Annual Computer Security…
1996
Corpus ID: 10588352
We describe the method used to develop a gateway capable of meeting the ITSEC E4 requirements. The security policy was formally…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE