Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,237,304 papers from all fields of science
Search
Sign In
Create Free Account
Managed security service
Known as:
Managed Security Services
, Managed security services provider
, Managed Security Service Provider
Expand
In computing, managed security services (MSS) are network security services that have been outsourced to a service provider. A company providing such…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
5 relations
Email filtering
Firewall (computing)
Information security operations center
Network security
Broader (1)
Outsourcing
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
Managing Interdependent Information Security Risks: Cyberinsurance, Managed Security Services, and Risk Pooling Arrangements
Xia Zhao
,
Ling Xue
,
Andrew Whinston
Journal of Management Information Systems
2013
Corpus ID: 7054861
The interdependency of information security risks often induces firms to invest inefficiently in information technology security…
Expand
Highly Cited
2012
Highly Cited
2012
Dangerous tales: Dominant narratives on the Congo and their unintended consequences
Séverine Autesserre
2012
Corpus ID: 36974437
Explanations for the persistence of violence in the eastern part of the Democratic Republic of Congo blame the incendiary actions…
Expand
Highly Cited
2010
Highly Cited
2010
The Political Economy of Managed Migration: Nonstate Actors, Europeanization, and the Politics of Designing Migration Policies
G. Menz
2010
Corpus ID: 152806645
European governments have re-discovered labour migration, but are eager to be perceived as controlling unsolicited forms of…
Expand
Highly Cited
2008
Highly Cited
2008
Using fuzzy Delphi method in maintenance strategy selection problem
A. Jafari
,
M. Jafarian
,
A. Zarei
,
F. Zarepour
2008
Corpus ID: 11727910
In this paper, a new approach that applies fuzzy Delphi method in Simple Additive Weighting (SAW) is proposed to be used in the…
Expand
Review
2008
Review
2008
Gender differentials in agricultural productivity: evidence from Nepalese household data
Sridhar Thapa
2008
Corpus ID: 55217434
This study analyzes productivity differentials between men and women in the peasant agriculture in Nepal. Both Cobb-Douglas and…
Expand
Review
2007
Review
2007
Who Chooses to Carpool and Why?
Jianling Li
,
P. Embry
,
S. Mattingly
,
K. Sadabadi
,
Isaradatta Rasmidatta
,
M. Burris
2007
Corpus ID: 30932757
The debate over high-occupancy vehicle (HOV) and high-occupancy toll lane efficiency has raised questions about whether HOVs…
Expand
2005
2005
Outsourcing Internet Security: Economic Analysis of Incentives for Managed Security Service Providers
Wen Ding
,
W. Yurcik
,
Xiaoxin Yin
Workshop on Internet and Network Economics
2005
Corpus ID: 18801704
Firms hesitate to outsource their network security to outside security providers (called Managed Security Service Providers or…
Expand
Highly Cited
2004
Highly Cited
2004
On the loss of saltmarshes in south‐east England and the relationship with Nereis diversicolor
R. Morris
,
Ian Reach
,
M. Duffy
,
T. Collins
,
R. Leafe
2004
Corpus ID: 55583312
Summary 1. Two papers, Hughes & Paramor (2004) and Paramor & Hughes (2004), published in Journal of Applied Ecology are discussed…
Expand
Highly Cited
2002
Highly Cited
2002
Master/Slave Speculative Parallelization
C. Zilles
,
G. Sohi
35th Annual IEEE/ACM International Symposium on…
2002
Corpus ID: 12523685
Master/Slave Speculative Parallelization (MSSP) is an execution paradigm for improving the execution rate of sequential programs…
Expand
Highly Cited
2001
Highly Cited
2001
Soil: Environmental effects on allelochemical activity : Allelopathy in Natural and Managed Ecosystems
Inderjit
2001
Corpus ID: 88891489
To exert phytotoxic effects on other plant species, chemicals may have to move to the roots of the target plant through the soil…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE