Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,113,972 papers from all fields of science
Search
Sign In
Create Free Account
Security Technical Implementation Guide
Known as:
Stig
A Security Technical Implementation Guide (STIG) is a cybersecurity methodology for standardizing security protocols within networks, servers…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
5 relations
Broader (2)
Computer security
Configuration management
Desktop computer
Information assurance vulnerability alert
Security Content Automation Protocol
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2007
Review
2007
Volume computation : a comparison of total station versus laser scanner and different software
Bettina Pflipsen
2007
Corpus ID: 96423425
The Laser scanner belongs to the new devices on the market of surveying instruments. Tests and measurements gave and still give…
Expand
2005
2005
SELECTION OF CURRENT TRANSFORMERS & WIRE SIZING IN SUBSTATIONS
S. Ganesan
2005
Corpus ID: 18757008
More and more sub-stations are retrofitted with numerical relays, meters and monitoring devices. Most often, the older relay gets…
Expand
2005
2005
Improving software product integration
S. Larsson
2005
Corpus ID: 59730120
Organizations often encounter problems in the Product Integration process. The difficulties include finding errors at integration…
Expand
2003
2003
Mineralisation of 15N-labelled sheep manure in soils of different texture and water contents
I. Thomsen
,
P. Schjønning
,
B. Christensen
Biology and Fertility of Soils
2003
Corpus ID: 40635565
In order to investigate the effect of soil water and texture on C and N mineralisation of applied organic matter, sheep manure…
Expand
2003
2003
Running research-oriented final year projects for CS and IS students
B. Olsson
,
M. Berndtsson
,
B. Lundell
,
J. Hansson
Technical Symposium on Computer Science Education
2003
Corpus ID: 17943326
In this paper we discuss the difficulties of designing and running a final year project course for computer science and…
Expand
Review
2002
Review
2002
Mutual Recognition of Professional Qualifications
Frances Plimmer
2002
Corpus ID: 154213248
In the light of Europe’s experience of its Directive on mutual recognition of professional qualifications and the World Trade…
Expand
Highly Cited
1997
Highly Cited
1997
The verb in contemporary English: theory and description
B. Aarts
,
Charles F. Meyer
1997
Corpus ID: 125691177
This collection of essays sheds new light on the verb in English. The authors illustrate that verbs can only be properly…
Expand
1996
1996
The expression of modality in Korean
A. Wymann
1996
Corpus ID: 60127189
1996
1996
Multi-Scale Segmentation of Grey-Scale Images
O. F. Olsen
1996
Corpus ID: 18651058
The topic of this thesis is segmentation of grey{scale images by accessing and relating the structures of the image for all…
Expand
1963
1963
Stig of the Dump
C. King
,
E. Ardizzone
1963
Corpus ID: 106530895
Barney is a solitary eight-year-old, given to wandering off by himself. One day he is lying on the edge of disused chalk-pit when…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE