Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 221,507,234 papers from all fields of science
Search
Sign In
Create Free Account
National Cybersecurity Center
Known as:
Cyber Security Czar
, Cyber-security czar
The National Cybersecurity Center (NCSC) is an office within the United States Department of Homeland Security (DHS) created in March 2008, and is…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
3 relations
Comprehensive National Cybersecurity Initiative
National Cyber Security Division
Outline of computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Congressional Cybersecurity Oversight: Who's Who and How it Works
L. Trautman
2020
Corpus ID: 154020512
Cybersecurity remains perhaps the greatest challenge to the economic and physical well being of governments, individuals, and…
Expand
Review
2019
Review
2019
Review of Cybersecurity Audit Management and Execution Approaches
Khairun Nisyak Zakaria
,
S. H. Othman
,
A. Zainal
International Conference on Research and…
2019
Corpus ID: 216104716
The management and execution of good cybersecurity audits help organizations to strengthen their cybersecurity operations by…
Expand
2019
2019
Basic Forensic Procedures for Cyber Crime Investigation in Smart Grid Networks
I. Kotsiuba
,
I. Skarga-Bandurova
,
Alkiviadis Giannakoulias
,
Oksana Bulda
IEEE International Conference on Big Data (Big…
2019
Corpus ID: 211298721
The paper outlines some aspects of developing a cyber-forensic framework for Smart Grid cyber-crime investigations. In this…
Expand
2017
2017
Physicians Looking To Purchase An EHR System
2017
Corpus ID: 45235552
An electronic health record system or a medical record will make medical practitioners more efficient in their practice. The…
Expand
2017
2017
Risky Cyber Security: '7012' Regulations Federally-Driven Inhibitor to Resilience within the Defense Industrial Base - A Position Paper
Larisa Breton
IEEE International Conference on Software Quality…
2017
Corpus ID: 10694635
U.S. Department of Defense regulations intended to improve cybersecurity within the Defense Industrial Base may cause degradation…
Expand
2016
2016
Cybersecurity Lanes in the Road for the Department of Homeland Security
David G. Shaffer
2016
Corpus ID: 157992473
Infrastructure protection/Computer networks; Technology; Intelligence; Intelligence/Intelligence policy; Law and justice/Criminal…
Expand
2015
2015
Organising National Cybersecurity Centres
Sarah Backman
Information & Security An International Journal
2015
Corpus ID: 166898129
The emerging trend in practises of organising national cybersecurity management via national cybersecurity centres unifies…
Expand
2014
2014
Website Falsification Detection System Based on Image and Code Analysis for Enhanced Security Monitoring and Response
Kyuil Kim
,
Sang-soo Choi
,
Hark-Soo Park
,
Sangjun Ko
,
Jungsuk Song
Conference on Information Security and Cryptology
2014
Corpus ID: 60675681
ABSTRACT New types of attacks that mainly compromise the public, portal and financial websites for the purpose of economic profit…
Expand
1987
1987
The Ghost Drum
Susan Price
1987
Corpus ID: 193242881
Czar Guidon kept his son Safa imprisoned in a tower. His power could only be matched by the witch-girl Chingis. Out of the frozen…
Expand
1982
1982
Letter Report: Czar Resoruces Federal 20-1 Well Location With 1.5 Miles of Access Road
C. Arthur
,
B. Aivazian
1982
Corpus ID: 126467003
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE