National Cyber Security Division

Known as: NCSD 
The National Cyber Security Division (NCSD) is a division of the Office of Cyber Security & Communications, within the United States Department… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2005-2017
02420052017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
The low complexity quantization of channel state information (CSI) and the utilization of vertical freedom of three dimension (3D… (More)
  • figure 2
  • figure 1
  • table I
  • figure 3
  • figure 4
Is this relevant?
2016
2016
Two important areas of our lives -- Internet of Things (IoT) and Clouds -- are based on the general information and communication… (More)
  • table I
  • table III
  • figure 1
  • table 1
Is this relevant?
2015
2015
  • 2015
Industry is aware of the need for Control System (CS) security, but in on-site assessments, Idaho National Laboratory (INL) has… (More)
  • figure 1
Is this relevant?
2012
2012
18 acm Inroads 2012 June • Vol. 3 • No.2 us. We need to keep up with, preferably in front of, technological and social change… (More)
Is this relevant?
2009
2009
Malware Attribute Enumeration and Characterization (MAEC) is a standardized language and format being formulated in cooperation… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2009
2009
CWE, which stands for Common Weakness Enumeration, is a project sponsored by the National Cyber Security Division of the US… (More)
Is this relevant?
Review
2008
Review
2008
Sustainable development is an innovative attitude derived from the awareness of ‘‘limits to growth’’ since the first oil crisis… (More)
  • table 1
Is this relevant?
2006
2006
This paper contains the various methodologies developed to evaluate the impact of La Electricidad de Caracas (EDC) investments on… (More)
  • figure 1
  • figure 3
Is this relevant?
2005
2005
software security—remain blithely unaware of their critical role. Without their direct participation, software security will… (More)
  • figure 1
  • figure 2
  • table 1
Is this relevant?
2005
2005
To view the full product, including the scope and methodology, click on the link above. For more information, contact David… (More)
  • table 2
  • figure 1
  • table 4
  • table 5
  • table 6
Is this relevant?