Operations security

Known as: Op sec, OpSec, Operational security 
Operations security (OPSEC) is a term originating in U.S. military jargon, as a process that identifies critical information to determine if friendly… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1983-2018
0102019832018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Large frequency deviation affects the output of auxiliary equipment of thermal power plant, which in turn will impact the… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
2014
Highly Cited
2014
Specialized image signal processors (ISPs) exploit the structure of image processing pipelines to minimize memory bandwidth using… (More)
  • figure 2
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Voltage collapse is a critical problem that impacts power system operational security. Timely and accurate assessment of voltage… (More)
  • figure 1
  • table I
  • figure 2
  • figure 3
  • table II
Is this relevant?
2005
2005
Existing security standards targets qualitative evaluation of the security level of a system against a set of predefined levels… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2004
2004
Nerve cuff electrodes have been shown to be safe and capable of effecting selective and controlled activation of select segments… (More)
  • figure 1
  • figure 3
  • figure 2
Is this relevant?
Highly Cited
1999
Highly Cited
1999
ÐThis paper presents the results of an experiment in security evaluation. The system is modeled as a privilege graph that… (More)
  • figure I
  • figure 2
  • figure 4
  • table 1
  • table 2
Is this relevant?
1999
1999
As public internetworks are increasingly used for secure communications, the need grows for end-to-end protection fi'om traffic… (More)
  • figure 1
  • figure 2
  • figure 4
  • table 1
  • table 2
Is this relevant?
1996
1996
This paper proposes a novel approach to help computing system administrators in monitoring the security of their systems. The… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
1994
1994
Ideally, a measure of the security of a system should capture quantitatively the intuitive notion of "the ability of the system… (More)
  • figure 1
  • table 1
Is this relevant?
1986
1986
  • Dag Bjork
  • INTELEC '86 - International Telecommunications…
  • 1986
This paper describes how traditional methods of charging and maintenance will be affected by the new types of alloy-free and… (More)
  • figure 4
  • figure 1
  • figure 2
  • figure 3
  • figure 6
Is this relevant?