Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,400,050 papers from all fields of science
Search
Sign In
Create Free Account
Security Vision
Security Vision – software meant for automation of information security management system (ISMS) organisation. Software of this kind is a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
37 relations
Access control
Antivirus software
Asset (computer security)
Backup
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
De la seguridad cibernética a la resiliencia cibernética aplicada a la protección de datos personales (Tema Central)
Claudia Patricia Orellana Robalino
2017
Corpus ID: 169767522
Information and communication technologies allows us to live in a network society, however there are several risks of a…
Expand
Review
2016
Review
2016
The System of Enterprise Economic Security: International and Ukrainian Content
L. Artemenko
2016
Corpus ID: 54696986
The article considers the categories of the system of enterprise economic security. The essence of the concepts of "danger…
Expand
2016
2016
5G-ENSURE - 5G enablers for network and system security and resilience
2016
Corpus ID: 196171900
Deliverable D3.5 is the update of the 5G-ENSURE security enablers Technical Roadmap previously delivered (i.e. D3.1). Compared to…
Expand
2016
2016
RELATIONSHIP AMONG WATER USE EFFICIENCY , CANOPY TEMPERATURE , CHLOROPHYLL CONTENT AND SPOT BLOTCH ( COCHLIOBOLUS SATIVUS ) RESISTANCE IN DIVERSE WHEAT ( TRITICUM AESTIVUM L . ) GERMPLASM
M. Jamil
,
Aamir Ali
,
+7 authors
A. Mujeeb-Kazi
2016
Corpus ID: 170076608
The food security vision for 2050 has frontlined wheat as the major conduit to feed the global populace estimated at 9.2 billion…
Expand
2013
2013
Assessing Security Cooperation: Improving Methods to Maximize Effects
D. Linquist
2013
Corpus ID: 107844138
Abstract : Security cooperation professionals work towards the development of a standardized assessment framework that not only…
Expand
2013
2013
A clean-slate security vision for future networks: Simultaneously ensuring information security and establishing smart in-network services using the example of blind packet forwarding
I. Simsek
,
M. Becke
,
Yves Igor Jerschow
,
E. Rathgeb
International Conference on Network of the Future
2013
Corpus ID: 17668020
To solve many of the challenges identified in Future Network debates, there are approaches, which suggest that a network should…
Expand
2010
2010
Identification of the Required Security Practices during e-Government Maturity
A. Shayan
,
B. Abdi
,
Malihe Qeisari
International Conference on Global Security…
2010
Corpus ID: 12706687
In spite of the e-government benefits, there are some problems during its successful implementation. One of which is information…
Expand
Review
2009
Review
2009
Towards Data-Centric Security in Ubiquitous Computing Environments
S. Ransom
,
Christian Werner
20th International Workshop on Database and…
2009
Corpus ID: 31838555
The vision of data-centric security promises to enable efficient security in future ubiquitous computing environments, which are…
Expand
2006
2006
On Cultural Security and Strategy in China under the Non-traditional Security Vision
Zhang Yong
2006
Corpus ID: 156657069
A nation prospers with its prosperity of its culture; it also declines with its decline of its culture. A nation’s culture has a…
Expand
2004
2004
Planning for Information System Security
2004
Corpus ID: 39797938
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE