Skip to search formSkip to main contentSkip to account menu

Security Technical Implementation Guide

Known as: Stig 
A Security Technical Implementation Guide (STIG) is a cybersecurity methodology for standardizing security protocols within networks, servers… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2007
Review
2007
The Laser scanner belongs to the new devices on the market of surveying instruments. Tests and measurements gave and still give… 
2003
2003
In order to investigate the effect of soil water and texture on C and N mineralisation of applied organic matter, sheep manure… 
Review
2002
Review
2002
In the light of Europe’s experience of its Directive on mutual recognition of professional qualifications and the World Trade… 
2002
2002
Abstract The aim of this article is to explore the use of an automated design system based on a Genetic Algorithm to design… 
Highly Cited
1997
Highly Cited
1997
This collection of essays sheds new light on the verb in English. The authors illustrate that verbs can only be properly… 
1996
1996
1996
The topic of this thesis is segmentation of grey{scale images by accessing and relating the structures of the image for all… 
1963
1963
Barney is a solitary eight-year-old, given to wandering off by himself. One day he is lying on the edge of disused chalk-pit when… 
1944
1944
Einlei tung; Problemstellung und Schrift tum . . . . . . . . . . . . . . . . . . . . . . . 172--180 ~a te r i a l unr Me,bode…