Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,780,767 papers from all fields of science
Search
Sign In
Create Free Account
Operations security
Known as:
Op sec
, OpSec
, Operational security
Expand
Operations security (OPSEC) is a term originating in U.S. military jargon, as a process that identifies critical information to determine if friendly…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Communications security
Darknet market
Email encryption
For Official Use Only
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Essential lack of security proof in quantum key distribution
H. Yuen
2013
Corpus ID: 117853749
All the currently available unconditional security proofs on quantum key distribution, in particular for the BB84 protocol and…
Expand
2013
2013
Fitness Sharing Particle Swarm Optimization Approach to FACTS Installation for Transmission System Loadability Enhancement
Ya-Chin Chang
2013
Corpus ID: 55058850
Proper installation of Flexible AC Transmission Systems (FACTS) devices in existing transmission networks can enable power…
Expand
2012
2012
Demand-Side Response in Pool-Based Day-Ahead Electricity Markets
Rekha Swami
2012
Corpus ID: 11193757
The active demand-side response in electricity market would produce benefits not only for individual consumers but also for the…
Expand
2011
2011
Analysis of acceptable capacity of microgrid connected to the main power grid
Peng Li
,
Xiaochu Li
,
Jinxin Liu
,
Jing Chen
,
Jianjie Chen
International Conference on Electric Utility…
2011
Corpus ID: 13219057
It has been one of the most effective way to fully develop the Distributed Generation (DG) when it is connected to the main power…
Expand
2009
2009
Pakistan's Nuclear Future: Reining in the Risk
Henry D. Sokolski
2009
Corpus ID: 150639959
Politics and government/Foreign governments; Terrorism and threats; Weapons and weapon systems/Nuclear and radiological weapons
2009
2009
Russia and Arms Control: Are There Opportunities for the Obama Administration?
Stephen J. Blank
2009
Corpus ID: 151168955
Abstract : Even before the Russian invasion of Georgia in August 2008, U.S.-Russian relations were reaching an impasse. Matters…
Expand
2008
2008
Forensic Characteristics of Phishing - Petty Theft or Organized Crime?
S. McCombie
,
P. Watters
,
Alex Ng
,
Brett Watson
International Conference on Web Information…
2008
Corpus ID: 38743334
: Phishing, as a means of pilfering private consumer information by deception, has become a major security concern for financial…
Expand
2005
2005
Identity-Based Encryption with Conventional Public-Key Infrastructure
J. Callas
2005
Corpus ID: 18386761
This paper proposes an identity-based encryption (IBE) scheme based on traditional public-key cryptographic systems, such as RSA…
Expand
2004
2004
Framework for Operational Security Requirements for IP Network Infrastructure
G. Jones
2004
Corpus ID: 168135254
This document outlines work to be done and documents to be produced by the Operational Security Capabilities (OPSEC) Working…
Expand
1994
1994
[IEEE COMPASS\'94 - 1994 IEEE 9th Annual Conference on Computer Assurance - Gaithersburg, MD, USA (27 June-1 July 1994)] Proceedings of COMPASS\'94 - 1994 IEEE 9th Annual Conference on Computer…
Brocklehurst
,
Littlewood
,
Olovsson
,
Jónsson
1994
Corpus ID: 117528717
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE