Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,437,386 papers from all fields of science
Search
Sign In
Create Free Account
Secure state
A secure state is an information systems security term to describe where entities in a computer system are divided into subjects and objects, and it…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
4 relations
Bell–LaPadula model
Information system
Mathematical induction
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Observability-based secure state encryption design for cyberphysical systems
Yimeng Dong
,
N. Chopra
International Conference on Intelligent Cloud…
2018
Corpus ID: 3781454
While the area of cryptography has progressed considerably over the last few decades, its applications to networked dynamical…
Expand
Review
2017
Review
2017
Multi-level security for the 5G/IoT ubiquitous network
O. Salman
,
A. Kayssi
,
A. Chehab
,
I. Elhajj
International Conference on Fog and Mobile Edge…
2017
Corpus ID: 23606774
5G, the fifth generation of mobile communication networks, is considered as one of the main IoT enablers. Connecting billions of…
Expand
2016
2016
Preventive Control Design for Voltage Stability Considering Multiple Critical Contingencies
M. Mansour
,
L. Alberto
,
R. Ramos
IEEE Transactions on Power Systems
2016
Corpus ID: 28612673
A new methodology for selecting a global group of the most effective preventive controls in the context of voltage stability…
Expand
2013
2013
Qualitative analysis of a BDMP by Finite Automaton
P. Chaux
,
Jean-Marc Roussel
,
J. Lesage
,
G. Deleuze
,
M. Bouissou
2013
Corpus ID: 15161677
The Boolean Driven Markov Processes (BDMPs) were developed by EDF to conduct predictive risk modelling and assessment on critical…
Expand
2013
2013
Enhancing wide-area monitoring and control with intelligent alarm handling
C. Basu
,
K. Das
,
J. Hazra
,
D. Seetharam
IEEE PES ISGT Europe
2013
Corpus ID: 7666034
With advances in synchrophasor (PMU) technology, we have an opportunity to enhance power system monitoring and control schemes…
Expand
2010
2010
A Formal IT-Security Model for the Correction and Abort Requirement of Electronic Voting
Rüdiger Grimm
,
Katharina Hupf
,
M. Volkamer
Electronic Voting
2010
Corpus ID: 9255350
This paper addresses a basic security requirement of electronic voting, namely that a voter can correct or abort his vote at any…
Expand
2008
2008
A real-time intrusion detection algorithm for network security
H. El-Bakry
,
N. Mastorakis
2008
Corpus ID: 14235599
E-government is an important issue which integrates existing local area networks into a global network that provide many services…
Expand
2006
2006
Secure State Processing
S. Price
,
S. Price
IEEE Information Assurance Workshop
2006
Corpus ID: 14934540
The information assurance (IA) model, an extension of the McCumber information security model, specifies security services for…
Expand
1999
1999
Hybrid Discrete and Continuous Control for Power Systems
W. Esselman
,
D. Sobajic
,
J. Maulbetsch
Discrete event dynamic systems
1999
Corpus ID: 5484341
The control of the electricity supply from generation to end-use has been an engineering and mathematical challenge for many…
Expand
1992
1992
A Guide to Understanding Object Reuse in Trusted Systems
James P. Anderson
,
R. Vaughn
1992
Corpus ID: 60905774
Abstract : This document provides a set of good practices related to the design and implementation of object reuse for systems…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE