bacterium AF19

 
National Institutes of Health

Topic mentions per year

Topic mentions per year

1997-2017
051019972017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2018
Review
2018
  • 2018
This paper will introduce the NSA's research project termed "Security-enhanced" Linux. It has been recognized that securing… (More)
  • figure 1
Is this relevant?
Review
2018
Review
2018
  • 2018
This paper will introduce the NSA's research project termed "Security-enhanced" Linux. It has been recognized that securing… (More)
  • figure 1
Is this relevant?
Review
2018
Review
2018
  • 2018
This paper will introduce the NSA's research project termed "Security-enhanced" Linux. It has been recognized that securing… (More)
  • figure 1
Is this relevant?
2017
2017
  • 2017
This paper discusses the importance of implementing application security at design time. It introduces threat modeling as a… (More)
  • figure 2.8
Is this relevant?
Review
2017
Review
2017
  • Susan Rajnic
  • 2017
This paper will introduce the NSA's research project termed "Security-enhanced" Linux. It has been recognized that securing… (More)
  • figure 1
Is this relevant?
Review
2017
Review
2017
  • 2017
The objective of enterprise security architecture is to provide the conceptual design of the network security infrastructure… (More)
  • table 1
Is this relevant?
Review
2013
Review
2013
  • 2013
The objective of enterprise security architecture is to provide the conceptual design of the network security infrastructure… (More)
  • table 1
Is this relevant?
Review
2013
Review
2013
  • 2013
The objective of enterprise security architecture is to provide the conceptual design of the network security infrastructure… (More)
  • table 1
Is this relevant?
Review
2002
Review
2002
  • C. Farley Howard GSEC
  • 2002
Much has previously been written on the importance, relevance, and critical application of the CIA (Confidentiality, Integrity… (More)
Is this relevant?
1997
1997
  • Steven F Burns
  • 1997
This paper discusses the importance of implementing application security at design time. It introduces threat modeling as a… (More)
  • figure 2.8
Is this relevant?