Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,516,440 papers from all fields of science
Search
Sign In
Create Free Account
Security Measures
Known as:
Measure, Security
, Measures, Security
, Security Measure
Regulations to assure protection of property and equipment.
National Institutes of Health
Create Alert
Alert
Related topics
Related topics
3 relations
National Security
legislation & jurisprudence
standards characteristics
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Android voice recognition application with multi speaker feature
George Frewat
,
Charbel Baroud
,
Roy Sammour
,
A. Kassem
,
M. Hamad
Mediterranean Electrotechnical Conference
2016
Corpus ID: 22410668
In this paper, we discuss two things. In the first part of the paper, we discuss the means of processing the speech signal using…
Expand
Review
2013
Review
2013
SECURITY ISSUES AND SOLUTIONS IN VEHICULAR ADHOC NETWORK : A REVIEW APPROACH
R. Raw
,
Manish Kumar
,
Nanhay Singh
2013
Corpus ID: 14461072
Vehicular networks are the promising approach to provide safety to the drivers. It becomes a key component of intelligent…
Expand
2012
2012
Probing the Intermittent Energy Resource Contributions From Generation Adequacy and Security Perspectives
W. Wangdee
,
R. Billinton
IEEE Transactions on Power Systems
2012
Corpus ID: 21072110
Significant integration of intermittent energy resources such as wind power generation in electric system dictates the need to…
Expand
2012
2012
Security Evaluation for Software System with Vulnerability Life Cycle and User Profiles
H. Okamura
,
M. Tokuzane
,
T. Dohi
Workshop on Dependable Transportation Systems…
2012
Corpus ID: 17482836
This paper proposes the definition of a security criterion and security assessment based on the criterion. More precisely, we…
Expand
2010
2010
A network security evaluation method based on fuzzy and RST
Lijuan Zhang
,
Qingxian Wang
International Conference on Education Technology…
2010
Corpus ID: 17009349
The security evaluation for an information network system is an important management tool to insure its normal operation. We must…
Expand
2009
2009
Performing Ultrasound-Guided Supraclavicular Blocks in the Outpatient Setting-An Additional Security Measure
C. Luyet
,
M. Wipfli
,
U. Eichenberger
,
Z. S. Farkas
Regional anesthesia and pain medicine
2009
Corpus ID: 221800908
To the Editor: R ecently, ultrasound has been used to facilitate a saphenous nerve (SN) block at the adductor canal. In our…
Expand
2008
2008
Pareto-optimal situaton analysis for selection of security measures
Andres Ojamaa
IEEE Military Communications Conference
2008
Corpus ID: 37727671
A methodology of selection of security measures is presented and a prototype implementation in the form of a hybrid expert system…
Expand
2008
2008
A risk and cost-benefit assessment of Australian aviation security measures
M. Stewart
,
John Mueller
2008
Corpus ID: 114189515
The Australian government Office of Best Practice Regulation has recommended the use of cost-benefit assessment for all proposed…
Expand
2007
2007
Mobile Phones Security Using Biometrics
H. Shabeer
,
P. Suganthi
International Conference on Computational…
2007
Corpus ID: 29386489
Stealing cell phone has become the eye catching business for culprits. There should be a reliable method of protecting the…
Expand
2005
2005
A Comprehensive and Comparative Metric for Information Security
S. Weiss
,
O. Weissmann
,
F. Dressler
2005
Corpus ID: 17666298
Measurement of information security is important for organizations to justify security decisions and investments. Unfortunately…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE