Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,400,056 papers from all fields of science
Search
Sign In
Create Free Account
Information security
Known as:
CIA (disambiguation)
, INFOSEC
, CIA criteria
Expand
Information security, sometimes shortened to InfoSec, is the practice of defending information from unauthorized access, use, disclosure, disruption…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Application security
BLADE
Block cipher mode of operation
Ciphertext indistinguishability
Expand
Broader (1)
Data security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Power line communication in IoT-systems
A. Zhilenkov
,
Dinis D. Gilyazov
,
I. Matveev
,
Yanina V. Krishtal
IEEE Conference of Russian Young Researchers in…
2017
Corpus ID: 6814073
Internet of Things (IoT) — a unified network of physical objects that can change the parameters of the environment or their own…
Expand
Review
2016
Review
2016
A Systematic Review of Information Security Frameworks in the Internet of Things (IoT)
M. Irshad
IEEE 18th International Conference on High…
2016
Corpus ID: 14227228
By 2020, it is estimated that the number of connected devices is expected to grow exponentially to 50 billion. Internet of things…
Expand
2013
2013
Iris recognition based on bidimensional empirical mode decomposition and fractal dimension
Wei-Kuei Chen
,
Jen-Chun Lee
,
W. Han
,
Chih-Kuang Shih
,
Ko-Chin Chang
Information Sciences
2013
Corpus ID: 34087555
Highly Cited
2013
Highly Cited
2013
Effect of Black Hole Attack on MANET Routing Protocols
J. Kumar
,
M. Kulkarni
,
D. Gupta
2013
Corpus ID: 53381399
Due to the massive existing vulnerabilities in mobile ad-hoc networks, they may be insecure against attacks by the malicious…
Expand
Highly Cited
2010
Highly Cited
2010
An Online Adaptive Approach to Alert Correlation
H. Ren
,
Natalia Stakhanova
,
A. Ghorbani
International Conference on Detection of…
2010
Corpus ID: 7291395
The current intrusion detection systems (IDSs) generate a tremendous number of intrusion alerts. In practice, managing and…
Expand
Highly Cited
2008
Highly Cited
2008
A Minimalist Mutual Authentication Protocol for RFID System & BAN Logic Analysis
Qingling Cai
,
Zhan Yiju
,
Yonghua Wang
ISECS International Colloquium on Computing…
2008
Corpus ID: 5546972
This paper proposes a new security protocol with satisfying the lightweight requirements of the security of RFID system - A…
Expand
Review
2006
Review
2006
The role of behavioral research and profiling in malicious cyber insider investigations
E. Shaw
Digital Investigation. The International Journal…
2006
Corpus ID: 30624967
Highly Cited
2005
Highly Cited
2005
Experimental investigation of security issues in OCDMA: a code-switching scheme
D. Leaird
,
Zhi Jiang
,
A. Weiner
2005
Corpus ID: 18418897
Spectrally phase coded OCDMA with a modulation format based on switching between two codes is demonstrated. The code switching…
Expand
Highly Cited
2003
Highly Cited
2003
Web Services Security (WS-Security)
Bob Atkinson
2003
Corpus ID: 166854042
WS-Security describes enhancements to SOAP messaging to provide quality of protection through message integrity, message…
Expand
Highly Cited
1991
Highly Cited
1991
Information Security Handbook
W. Caelli
,
D. Longley
,
M. Shain
1991
Corpus ID: 166244603
Security management and policy risk management contingency planning and damage avoidance information security and the law…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE