Skip to search formSkip to main contentSkip to account menu

Secure state

A secure state is an information systems security term to describe where entities in a computer system are divided into subjects and objects, and it… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
While the area of cryptography has progressed considerably over the last few decades, its applications to networked dynamical… 
Review
2017
Review
2017
5G, the fifth generation of mobile communication networks, is considered as one of the main IoT enablers. Connecting billions of… 
2016
2016
A new methodology for selecting a global group of the most effective preventive controls in the context of voltage stability… 
2013
2013
The Boolean Driven Markov Processes (BDMPs) were developed by EDF to conduct predictive risk modelling and assessment on critical… 
2013
2013
With advances in synchrophasor (PMU) technology, we have an opportunity to enhance power system monitoring and control schemes… 
2010
2010
This paper addresses a basic security requirement of electronic voting, namely that a voter can correct or abort his vote at any… 
2008
2008
E-government is an important issue which integrates existing local area networks into a global network that provide many services… 
2006
2006
The information assurance (IA) model, an extension of the McCumber information security model, specifies security services for… 
1999
1999
The control of the electricity supply from generation to end-use has been an engineering and mathematical challenge for many… 
1992
1992
Abstract : This document provides a set of good practices related to the design and implementation of object reuse for systems…