Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Operations security

Known as: Op sec, OpSec, Operational security 
Operations security (OPSEC) is a term originating in U.S. military jargon, as a process that identifies critical information to determine if friendly… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
The recent amplification DDoS attacks have swamped victims with huge loads of undesired traffic, sometimes even exceeding… Expand
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2014
Highly Cited
2014
As renowned scholars noted some years ago, " even studies of terrorism and political violence, which implicitly recognize the… Expand
Is this relevant?
Highly Cited
2010
Highly Cited
2010
  • Steve Lipner
  • Datenschutz und Datensicherheit - DuD
  • 2010
  • Corpus ID: 1638084
The increasing adoption of “client and cloud” computing raises several important concerns about security. This article discusses… Expand
Is this relevant?
Highly Cited
2009
Highly Cited
2009
A 167-processor computational platform consists of an array of simple programmable processors capable of per-processor dynamic… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2009
Highly Cited
2009
  • R. Diao, Kai Sun, +5 authors S.K. Sarawgi
  • IEEE Transactions on Power Systems
  • 2009
  • Corpus ID: 13460915
Voltage collapse is a critical problem that impacts power system operational security. Timely and accurate assessment of voltage… Expand
  • figure 1
  • table I
  • figure 2
  • figure 3
  • table II
Is this relevant?
2008
2008
Currently the operators of electrical distribution networks face a number of challenges, such as load growth, the proliferation… Expand
  • figure 1
  • figure 3
  • figure 2
  • table 1
  • figure 4
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Protocol standards, particularly those for critical control systems in the petroleum and power industry, have traditionally been… Expand
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Intrusion detection and response research has so far mostly concentrated on known and well-defined attacks. We believe that this… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1999
Highly Cited
1999
This paper presents the results of an experiment in security evaluation. The system is modeled as a privilege graph that exhibits… Expand
  • figure 1
  • figure 2
  • figure 4
  • table 1
  • table 2
Is this relevant?
Highly Cited
1997
Highly Cited
1997
The paper is based on a conceptual framework in which security can be split into two generic types of characteristics, behavioral… Expand
  • table 1
  • table 2
  • figure 1
  • figure 2
  • figure 3
Is this relevant?