Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Security Technical Implementation Guide

Known as: Stig 
A Security Technical Implementation Guide (STIG) is a cybersecurity methodology for standardizing security protocols within networks, servers… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2009
Highly Cited
2009
As our field moves beyond the traditional dualism of mass and interpersonal forms of communication to encompass new, interactive… Expand
Is this relevant?
Highly Cited
2008
Highly Cited
2008
1. Introduction 2. Institutional Discourse / Approaches to the analysis of institutional discourse 3. University Discourse 4… Expand
Is this relevant?
Highly Cited
2005
Highly Cited
2005
In this article we investigate the expressions of collaborative activities within information seeking and retrieval processes (IS… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
  • figure 3
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Distress and symptoms of Post-Traumatic Stress Disorder (PTSD) were investigated among targets of experienced bullying at work… Expand
Is this relevant?
Highly Cited
2004
Highly Cited
2004
“Civilized living in market economies is not simply due to greater prosperity but to the order that formalized property rights… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2004
Highly Cited
2004
The present study evaluates indicators in Swedish spruce forests. We ask whether different species groups co-vary in their… Expand
  • table 2
  • figure 1
  • table 3
  • table 4
  • table 5
Is this relevant?
Highly Cited
2001
Highly Cited
2001
  • Graeme Hirst
  • Computational Linguistics
  • 2001
  • Corpus ID: 15795954
Since its publication in 1985, the outstanding 1,800-page Comprehensive Grammar of the English Language, by Randolph Quirk… Expand
Is this relevant?
Highly Cited
1999
Highly Cited
1999
This work involves the analysis of musical instrument sounds, the creation of timbre models, the estimation of the parameters of… Expand
  • figure 1.1
  • figure 3.3
  • figure 3.13
  • figure 3.12
  • figure 4.6
Is this relevant?
Highly Cited
1993
Highly Cited
1993
The implementation of both point of collapse (PoC) methods and continuation methods for the computation of voltage collapse… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
1992
Highly Cited
1992
The analysis of decision making under uncertainty is closely related to the analysis of probabilistic inference. Indeed, much of… Expand
  • figure I
  • figure 2
  • figure 3
  • figure 5
Is this relevant?