Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 210,087,260 papers from all fields of science
Search
Sign In
Create Free Account
National Cybersecurity Center
Known as:
Cyber Security Czar
, Cyber-security czar
The National Cybersecurity Center (NCSC) is an office within the United States Department of Homeland Security (DHS) created in March 2008, and is…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
3 relations
Comprehensive National Cybersecurity Initiative
National Cyber Security Division
Outline of computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Congressional Cybersecurity Oversight: Who's Who and How it Works
L. Trautman
2020
Corpus ID: 154020512
Cybersecurity remains perhaps the greatest challenge to the economic and physical well being of governments, individuals, and…
Expand
2019
2019
Basic Forensic Procedures for Cyber Crime Investigation in Smart Grid Networks
I. Kotsiuba
,
I. Skarga-Bandurova
,
Alkiviadis Giannakoulias
,
Oksana Bulda
IEEE International Conference on Big Data (Big…
2019
Corpus ID: 211298721
The paper outlines some aspects of developing a cyber-forensic framework for Smart Grid cyber-crime investigations. In this…
Expand
Highly Cited
2017
Highly Cited
2017
Cybersecurity
CACM staff
Studies in Big Data
2017
Corpus ID: 215808293
CS 121 Computer Science 1 4 CS 122 Computer Science 2 4 CS 32
2017
2017
Mobile r-gather: Distributed and Geographic Clustering for Location Anonymity
Jiemin Zeng
,
Gaurish Telang
,
+4 authors
Joseph S. B. Mitchell
ACM Interational Symposium on Mobile Ad Hoc…
2017
Corpus ID: 216051584
We study the r-gather clustering problem in a mobile and distributed setting. In this problem, nodes must be clustered into…
Expand
2015
2015
Organising National Cybersecurity Centres
Sarah Backman
Information & Security An International Journal
2015
Corpus ID: 166898129
The emerging trend in practises of organising national cybersecurity management via national cybersecurity centres unifies…
Expand
2014
2014
Website Falsification Detection System Based on Image and Code Analysis for Enhanced Security Monitoring and Response
Kyuil Kim
,
Sang-So Choi
,
Hark-Soo Park
,
Sangjun Ko
,
Jungsuk Song
Conference on Information Security and Cryptology
2014
Corpus ID: 60675681
ABSTRACT New types of attacks that mainly compromise the public, portal and financial websites for the purpose of economic profit…
Expand
2012
2012
"Naked as a Pair of Tongs": Twain's Philosophy of Clothes
Steven Petersheim
2012
Corpus ID: 190407767
"Clothes make the man." Mark Twain's famous maxim is followed by a second, lesser-known remark: "Naked people have little or no…
Expand
2012
2012
Czar wahania się pomiędzy tym, co wirtualne, a tym, co możliwe. Sztuka efemeryczna we współczesnej estetyce i myśli o sztuce na przykładzie wybranych prac współczesnych artystów słowackich
Jozef Cseres
2012
Corpus ID: 193248498
1987
1987
The Ghost Drum
Susan Price
1987
Corpus ID: 193242881
Czar Guidon kept his son Safa imprisoned in a tower. His power could only be matched by the witch-girl Chingis. Out of the frozen…
Expand
1972
1972
Godlewski, Aleksander Lech. Czar Dalekiej Nuku Hiva. [Charmes de la lointaine Nuku-Hiva]
Charlotte Olmar
1972
Corpus ID: 183705885
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE