Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

security classification

 
National Institutes of Health

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
The present report proposes a methodology for Smart Grid Security Classification (SGSC) having as target usage the complex… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2016
2016
Cloud computing concept can easily be described as a system in which multiple computers are attached to a real-time system using… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2013
Highly Cited
2013
A data mining approach using ensemble decision trees (DTs) learning is proposed for online dynamic security assessment (DSA… Expand
  • figure 1
  • table I
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2010
2010
Most verifiable multi-secret sharing schemes can not distinguish the security classification because of having the common… Expand
  • table 1
  • table 2
  • table 2
Is this relevant?
2010
2010
We investigate the systematic risk effect of introducing an accounting standard that required the classification of hybrid… Expand
Is this relevant?
Highly Cited
2009
Highly Cited
2009
This paper will describe the benefits of incorporating software Time and Space Partitioning (TSP), based upon the aeronautic IMA… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table I
Is this relevant?
2009
2009
In this paper a novel approach for transient stability based dynamic security classification and screening of power systems is… Expand
  • table I
  • table II
  • table III
  • table IV
  • table V
Is this relevant?
2007
2007
Abstract : In this paper, we address the inverse problem of source reconstruction for the di cult case of multiple sources when… Expand
  • table 1
  • table 2
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2004
2004
In this paper, the authors present a pattern-learning/recognition approach for dynamic security classification using neural… Expand
  • figure 1
  • table I
  • figure 2
  • table II
Is this relevant?
2001
2001
With each passing year, more and more valuable, confidential information is stored in government and commercial computer systems… Expand
  • figure 1
  • figure 2
Is this relevant?