Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 219,937,504 papers from all fields of science
Search
Sign In
Create Free Account
National Cyber Security Division
Known as:
NCSD
The National Cyber Security Division (NCSD) is a division of the Office of Cyber Security & Communications, within the United States Department…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
11 relations
Common Vulnerabilities and Exposures
Comprehensive National Cybersecurity Initiative
Computer security
Cyber-security regulation
Expand
Broader (1)
Cyberwarfare
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Aerodynamic Shape Optimization with Time Spectral Flutter Adjoint
Sicheng He
,
E. Jonsson
,
C. Mader
,
J. Martins
AIAA Scitech Forum
2019
Corpus ID: 127917878
Flutter onset characteristic are an important consideration in commercial airliner design. Previous work with high-fidelity…
Expand
2016
2016
State-Level Views on Professional Competencies in the Field of IoT and Cloud Information Security
N. Miloslavskaya
,
A. Tolstoy
IEEE 4th International Conference on Future…
2016
Corpus ID: 6611251
Two important areas of our lives -- Internet of Things (IoT) and Clouds -- are based on the general information and communication…
Expand
2016
2016
Participatory mechanisms and inequality reduction: searching for plausible relations
V. Coelho
,
L. Waisbich
2016
Corpus ID: 55047822
Brazil is known for being one of the most unequal countries in the world. Since the 1990s many scholars, both in Brazil and those…
Expand
2011
2011
The Development of a Graduate Curriculum for Software Assurance
M. Ardis
,
Nancy R. Mead
Americas Conference on Information Systems
2011
Corpus ID: 264660787
One of our challenges as educators is timely incorporation of research into curricula that can be adopted by universities to…
Expand
Review
2010
Review
2010
SUCCESSES AND FAILURES APPREHENDING MALWARE AUTHORS
Raymond A. Pompon
2010
Corpus ID: 54619791
This paper walks through the Donttrip malware case, a successful malware investigation prosecution, from the initial infection to…
Expand
Review
2010
Review
2010
A Survey on SCADA / Distributed Control System Current Security Development and Studies
A. Ozbilen
,
I. Colak
,
Ş. Sağiroğlu
2010
Corpus ID: 27371478
Abstract : Supervisory Control and Data Acquisition (SCADA) systems and other distributed control systems, are widely used in…
Expand
2010
2010
Jumping security hurdles
S. Furnell
2010
Corpus ID: 62182116
2009
2009
The Concepts of the Malware Attribute Enumeration and Characterization ( MAEC ) Effort
I. A. Kirillov
,
Melissa P. Chase
2009
Corpus ID: 3069277
Malware Attribute Enumeration and Characterization (MAEC) is a standardized language and format being formulated in cooperation…
Expand
Highly Cited
2007
Highly Cited
2007
An intelligent NC program processor for CNC system of machine tool
Yadong Liu
,
Xingui Guo
,
Wei Li
,
K. Yamazaki
,
K. Kashihara
,
M. Fujishima
Robotics and Computer-Integrated Manufacturing
2007
Corpus ID: 55769741
Highly Cited
2005
Highly Cited
2005
Visible electroluminescence from silicon nanocrystals embedded in amorphous silicon nitride matrix
Liang-Yih Chen
,
W. Chen
,
Franklin Chau-Nan Hong
2005
Corpus ID: 264240211
Visible electroluminescence from silicon nanocrystals (Si-NCs) embedded in amorphous silicon nitride (a‐SiNx) films has been…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE