System Integrity Protection

Known as: Csrutil, Kext signing 
System Integrity Protection (SIP, sometimes referred to as rootless) is a security feature of the macOS operating system by Apple. It comprises a… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2007-2015
02420072015

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Events, such as faults, loss of load, or generation may cause unwanted relay operations which initiate cascade tripping leading… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2016
2016
  • Can Hua Huang
  • 2017 IEEE Power & Energy Society General Meeting
  • 2016
This paper investigates the latency of system integrity protection schemes (SIPSs) and proposes a bounded model of the… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2014
2014
This paper discusses about SIPS for Southern grid in India which involves the identification and ranking of the most severe… (More)
  • figure 1
  • figure 2
  • figure 2
  • figure 3
Is this relevant?
2014
2014
This paper is a summary of an IEEE/PES Power System Relaying Committee (PSRC) report [2] on the design and testing of selected… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 3
Is this relevant?
2014
2014
System Integrity Protection Schemes (SIPS) are one of the most widely used solutions to the challenges in operating and… (More)
  • figure 1
  • table II
  • table I
  • figure 2
  • figure 3
Is this relevant?
2013
2013
System integrity protection scheme (SIPS) is designed to ensure the security of power system against structural outages and major… (More)
  • figure 2
  • figure 3
  • figure 1
  • figure 4
  • table I
Is this relevant?
2013
2013
The paper presents a control system solution based on synchronized phasor measurements for the urban area transmission system… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 5
Is this relevant?
Review
2010
Review
2010
This paper is a summary of the IEEE Power System Relaying Committee report on the System Integrity Protection Schemes (SIPS… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2009
2009
Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Review
2007
Review
2007
This paper describes some of the critical engineering, design, and applications of latest technology for system integrity… (More)
  • figure 1
Is this relevant?