Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Security Measures

Known as: Measure, Security, Measures, Security, Security Measure 
Regulations to assure protection of property and equipment.
National Institutes of Health

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
The notion of the Tactile Internet is burgeoning which permits us to transmit actuation and touch in real-time. With… Expand
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 6
Is this relevant?
2014
2014
Vehicular Ad hoc Network (VANET) is a communication network for vehicles on the highway. Presently, VANET technology is… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 5
Is this relevant?
Highly Cited
2013
Highly Cited
2013
Vehicular Ad hoc Networks (VANETs) are the promising approach to provide safety and other applications to the drivers as well as… Expand
  • figure 1
  • table 1
Is this relevant?
Highly Cited
2012
Highly Cited
2012
Android and Facebook provide third-party applications with access to users' private data and the ability to perform potentially… Expand
  • figure 3
  • figure 1
  • figure 2
  • figure 4
Is this relevant?
Highly Cited
2008
Highly Cited
2008
This paper seeks to discover whether aviation security measures are cost-effective by considering their effectiveness, their cost… Expand
  • table 1
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2007
2007
Stealing cell phone has become the eye catching business for culprits. There should be a reliable method of protecting the… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2005
2005
Measurement of information security is important for organizations to justify security decisions and investments. Unfortunately… Expand
Is this relevant?
Highly Cited
2002
Highly Cited
2002
This paper discusses the hardware foundations of the cryptosystem employed by the XboxTM video game console from Microsoft. A… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1994
Highly Cited
1994
Energy methods have shown promise as measures for quantifying the vulnerability of power systems to problems of voltage… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • table 2
Is this relevant?
Highly Cited
1990
Highly Cited
1990
A security measure is defined to indicate vulnerability to voltage collapse based on an energy function for system models that… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 5
Is this relevant?