Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,071,635 papers from all fields of science
Search
Sign In
Create Free Account
Operations security
Known as:
Op sec
, OpSec
, Operational security
Expand
Operations security (OPSEC) is a term originating in U.S. military jargon, as a process that identifies critical information to determine if friendly…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Communications security
Darknet market
Email encryption
For Official Use Only
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Thwarting Location Inference Attacks in Database-Driven Spectrum Sharing
Sudeep Bhattarai
,
P. Vaka
,
J. Park
IEEE Transactions on Cognitive Communications and…
2018
Corpus ID: 49354643
The use of geolocation databases (GDBs) for enabling spectrum sharing has been mandated by the Federal Communications Commission…
Expand
2012
2012
ICOEUR project results on improving observability and flexibility of large scale transmission systems
U. Hager
,
C. Rehtanz
,
N. Voropai
IEEE Power & Energy Society General Meeting
2012
Corpus ID: 8525084
Interstate connection of power grids provides multiple advantages concerning operational security, integration of renewable…
Expand
2011
2011
The Federal Information Security Management Act of 2002: A Potemkin Village
Danielle M. White
2011
Corpus ID: 54768668
Due to the daunting possibilities of cyberwarfare, and the ease with which cyberattacks may be conducted, the United Nations has…
Expand
2010
2010
Sufism in Northern Nigeria: Force for counter-radicalization?
J. Hill
2010
Corpus ID: 151139312
Abstract : In light of the ongoing threats issued by Al Qaeda against the United States and its allies, the need to prevent the…
Expand
2008
2008
Forensic Characteristics of Phishing - Petty Theft or Organized Crime?
S. McCombie
,
P. Watters
,
Alex Ng
,
Brett Watson
International Conference on Web Information…
2008
Corpus ID: 38743334
: Phishing, as a means of pilfering private consumer information by deception, has become a major security concern for financial…
Expand
2007
2007
Insider attack and real-time data mining of user behavior
Gary F. Anderson
,
David Selby
,
Mark Ramsey
IBM Journal of Research and Development
2007
Corpus ID: 1011941
Early detection of employees' improper access to sensitive or valuable data is critical to limiting negative financial impacts to…
Expand
2006
2006
A New Type of Insurgency? A Case Study of the Resistance in Iraq
S. Curtas
2006
Corpus ID: 54740207
2006
2006
Applying NIST SP 800-53 to Industrial Control Systems | NIST
S. Katzke
,
K. Stouffer
,
M. Abrams
,
D. Norton
,
J. Weiss
2006
Corpus ID: 110082521
The National Institute of Standards and Technology (NIST) has established an Industrial Control System Security Project to…
Expand
2006
2006
Operational Security Requirements for Large Collaborative Compute Infrastructures
H. Khurana
,
J. Basney
,
Von Welch
,
R. Campbell
International Conference on Collaborative…
2006
Corpus ID: 17066378
Large collaborative infrastructures that span multiple organizations such as those that enable grid computing and scientific…
Expand
1994
1994
[IEEE COMPASS\'94 - 1994 IEEE 9th Annual Conference on Computer Assurance - Gaithersburg, MD, USA (27 June-1 July 1994)] Proceedings of COMPASS\'94 - 1994 IEEE 9th Annual Conference on Computer…
Brocklehurst
,
Littlewood
,
Olovsson
,
Jónsson
1994
Corpus ID: 117528717
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required