Auswahl der wissenschaftlichen Literatur zum Thema „DC Security“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Inhaltsverzeichnis
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "DC Security" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "DC Security"
Turner, Billy G. „SECURITY: VA to DC“. Proceedings of the Water Environment Federation 2006, Nr. 1 (01.01.2006): 810–18. http://dx.doi.org/10.2175/193864706783789572.
Der volle Inhalt der QuelleNatsios, Deborah. „National Security Sprawl: Washington DC“. Architectural Design 75, Nr. 6 (November 2005): 80–85. http://dx.doi.org/10.1002/ad.179.
Der volle Inhalt der QuelleAnsari, Sakil Ahmad, und Jaychand Vishwakarma. „Survey on Database Concurrency Control in Multilevel Secure Database Management Systems“. International Journal of Advanced Research in Computer Science and Software Engineering 8, Nr. 4 (30.04.2018): 105. http://dx.doi.org/10.23956/ijarcsse.v8i4.645.
Der volle Inhalt der QuelleHaval, Abhijeet Madhukar. „Integration of Nonlinear Dynamics in Blockchain Security Protocols“. Advances in Nonlinear Variational Inequalities 26, Nr. 2 (30.06.2023): 94–109. http://dx.doi.org/10.52783/anvi.v26.i2.286.
Der volle Inhalt der QuelleWang, Zhuodi, Kejun Li, Jun Liang, Kaiqi Sun, Jinyu Wang und Zhijie Liu. „Coordinated Control Strategy of CU-MTDC under Abnormal Conditions Considering Power Supply Security“. Applied Sciences 11, Nr. 4 (08.02.2021): 1539. http://dx.doi.org/10.3390/app11041539.
Der volle Inhalt der QuelleGe, Huiyang, Hongbin Sun und Bin Wang. „Multi-scale AC−DC system voltage security regions“. Journal of Engineering 2019, Nr. 16 (01.03.2019): 3354–58. http://dx.doi.org/10.1049/joe.2018.8592.
Der volle Inhalt der QuelleDrew, Michael E. „Covid-19, Investment Risk, and Retirement Security“. Financial Planning Research Journal 6, Nr. 1 (01.12.2020): 8–20. http://dx.doi.org/10.2478/fprj-2020-0001.
Der volle Inhalt der QuelleHussain, Talha, Rizwan Bin Faiz, Mohammad Aljaidi, Adnan Khattak, Ghassan Samara, Ayoub Alsarhan und Raed Alazaidah. „Maximizing Test Coverage for Security Threats Using Optimal Test Data Generation“. Applied Sciences 13, Nr. 14 (16.07.2023): 8252. http://dx.doi.org/10.3390/app13148252.
Der volle Inhalt der QuelleGoodman, J., A. P. Dancy und A. P. Chandrakasan. „An energy/security scalable encryption processor using an embedded variable voltage DC/DC converter“. IEEE Journal of Solid-State Circuits 33, Nr. 11 (1998): 1799–809. http://dx.doi.org/10.1109/4.726580.
Der volle Inhalt der QuelleWANG, Lan, Chuanyu WANG und Juan XUE. „Optimal Investment of Defined Contribution Pension Based on Self-Protection and Minimum Security“. Wuhan University Journal of Natural Sciences 28, Nr. 2 (April 2023): 129–40. http://dx.doi.org/10.1051/wujns/2023282129.
Der volle Inhalt der QuelleDissertationen zum Thema "DC Security"
Eriksson, Robert. „Security-centered Coordinated Control in AC/DC Transmission Systems“. Licentiate thesis, Stockholm : Royal Institute of Technology, 2008. http://kth.diva-portal.org/smash/record.jsf?searchId=4&pid=diva2:101.
Der volle Inhalt der QuelleStevens, Phillip W. „Considering security in Florida's transportation project development process“. [Tampa, Fla] : University of South Florida, 2006. http://purl.fcla.edu/usf/dc/et/SFE0001508.
Der volle Inhalt der QuelleRegister, David Lain Brian. „Programming homeland security citizen preparedness and the threat of terrorism /“. [Denton, Tex.] : University of North Texas, 2007. http://digital.library.unt.edu/permalink/meta-dc-3922.
Der volle Inhalt der QuelleFernandopulle, Nilkamal Alden Robert T. H. Findlay Raymond D. Tang Chi-keung. „Improved dynamic security assessment for AC/DC power systems using transient energy functions“. *McMaster only, 2005.
Den vollen Inhalt der Quelle findenMohanty, Pranab. „Learning from biometric distances : performance and security related issues in face recognition systems“. [Tampa, Fla.] : University of South Florida, 2007. http://purl.fcla.edu/usf/dc/et/SFE0002298.
Der volle Inhalt der QuelleSchuessler, Joseph H. Windsor John C. „General deterrence theory assessing information systems security effectiveness in large versus small businesses /“. [Denton, Tex.] : University of North Texas, 2009. http://digital.library.unt.edu/permalink/meta-dc-9829.
Der volle Inhalt der QuelleYoung, Randall Frederick Windsor John C. „Defining the information security posture an empirical examination of structure, integration and managerial effectiveness /“. [Denton, Tex.] : University of North Texas, 2008. http://digital.library.unt.edu/permalink/meta-dc-9006.
Der volle Inhalt der QuellePati, Nishikanta Guturu Parthasarathy. „Occlusion tolerant object recognition methods for video surveillance and tracking of moving civilian vehicles“. [Denton, Tex.] : University of North Texas, 2007. http://digital.library.unt.edu/permalink/meta-dc-5133.
Der volle Inhalt der QuelleMeyer, Aric Tobolowsky Peggy M. „FISA and warrantless wire-tapping does FISA conform to fourth amendment standards? /“. [Denton, Tex.] : University of North Texas, 2009. http://digital.library.unt.edu/permalink/meta-dc-9838.
Der volle Inhalt der QuelleHuang, Jian Li Hao. „FPGA implementations of elliptic curve cryptography and Tate pairing over binary field“. [Denton, Tex.] : University of North Texas, 2007. http://digital.library.unt.edu/permalink/meta-dc-3963.
Der volle Inhalt der QuelleBücher zum Thema "DC Security"
DARPA Information Survivability Conference & Exposition (3rd 2003 Washington, D.C.). Proceedings: DARPA Information Survivability Conference and Exposition : Washington, DC, April 22-24, 2003. Los Alamitos, Calif: IEEE Computer Society, 2003.
Den vollen Inhalt der Quelle findenACM, Workshop on Rapid Malcode (1st 2003 Washington D. C. ). WORM '03: Proceedings of the 2003 ACM Workshop on Rapid Malcode : Washington, DC, USA, October 27, 2003. New York, N.Y: Association for Computing Machinery, 2003.
Den vollen Inhalt der Quelle findenUnited States. Congress. Senate. Committee on Appropriations. Homeland security: Hearings before the Committee on Appropriations, United States Senate, One Hundred Seventh Congress, second session : special hearings, April 10, 2002, Washington, DC; April 11, 2002, Washington, DC. Washington: U.S. G.P.O., 2002.
Den vollen Inhalt der Quelle finden1956-, Atluri Vijay, Liu Peng 1970- und Association for Computing Machinery. Special Interest Group on Security, Audit, and Control., Hrsg. Proceedings of the 10th ACM Conference on Computer and Communications Security: CCS 2003 : October 27-31, 2003, Washington, DC, USA. New York: ACM Press, 2003.
Den vollen Inhalt der Quelle finden1956-, Atluri Vijay, und Association for Computing Machinery. Special Interest Group on Security, Audit, and Control., Hrsg. Proceedings of the 9th ACM Conference on Computer and Communications Security: CCS 2002 : November 18-22, 2002, Washington, DC, USA. New York: ACM Press, 2002.
Den vollen Inhalt der Quelle findenAppropriations, United States Congress Senate Committee on. Homeland security and the fiscal year 2002 supplemental appropriations bill: Hearing before the Committee on Appropriations, United States Senate, One Hundred Seventh Congress, second session, special hearings, April 30, 2002, Washington, DC; May 2, 2002, Washington, DC; May 7, 2002, Washington, DC. Washington: U.S. G.P.O., 2003.
Den vollen Inhalt der Quelle findenD.C.) IEEE International Conference on Intelligence and Security Informatics (2012 Washington. 2012 IEEE International Conference on Intelligence and Security Informatics (ISI 2012): Washington, DC, USA, 11-14 June 2012. Piscataway, NJ: IEEE, 2012.
Den vollen Inhalt der Quelle findenD.C.) ACM Workshop on Rapid Malcode (2nd 2004 Washington. WORM '04: Proceedings of the 2004 ACM Workshop on Rapid Malcode : Washington, DC, USA, October 29, 2004, co-located with CSS 2004. New York, N.Y: Association for Computing Machinery, 2004.
Den vollen Inhalt der Quelle findenSupplemental appropriations for fiscal year 2006: Hearings before the Committee on Appropriations, United States Senate, One Hundred Ninth Congress, second session, special hearings, March 7, 2006, Washington, DC, March 8, 2006, Washington, DC, March 9, 2006, Washington DC. Washington: U.S. G.P.O., 2007.
Den vollen Inhalt der Quelle findenUnited States. Congress. House. Permanent Select Committee on Intelligence. Subcommittee on Intelligence Community Management. Security clearance reform: Hearing before the Subcommittee on Intelligence Community Management of the Permanent Select Committee on Intelligence, One Hundred Tenth Congress, first session, hearing held in Washington, DC, February 27, 2008. Washington: U.S. G.P.O., 2008.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "DC Security"
Bleumer, Gerrit. „DC Network“. In Encyclopedia of Cryptography and Security, 313–15. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_194.
Der volle Inhalt der QuelleBleumer, Gerrit. „Dining Cryptographers (DC) Network“. In Encyclopedia of Cryptography, Security and Privacy, 1–3. Berlin, Heidelberg: Springer Berlin Heidelberg, 2023. http://dx.doi.org/10.1007/978-3-642-27739-9_194-2.
Der volle Inhalt der QuelleZheng, Kai, Xiang Yao und Wei Wang. „Reliability Evaluation of Smart DC Microgrid“. In Advances in Artificial Intelligence and Security, 595–605. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-06764-8_46.
Der volle Inhalt der QuelleKarpaga Priya, R., S. Kavitha, M. Malathi, P. Sinthia und K. Suresh Kumar. „Single-Phase Bi-Directional AC/DC Converters for Fast DC Bus Voltage Controller“. In Emerging Trends in Expert Applications and Security, 33–44. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-1946-8_4.
Der volle Inhalt der QuelleWaye, Lucas, Pablo Buiras, Dan King, Stephen Chong und Alejandro Russo. „It’s My Privilege: Controlling Downgrading in DC-Labels“. In Security and Trust Management, 203–19. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-24858-5_13.
Der volle Inhalt der QuelleLi, Long-Hai, Cheng-Qiang Huang und Shao-Feng Fu. „Boardroom Voting Scheme with Unconditionally Secret Ballots Based on DC-Net“. In Network and System Security, 220–32. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34601-9_17.
Der volle Inhalt der QuelleBhaduri Mandal, Arkaprava, und Tanmoy Kanti Das. „Anti-forensics of a NAD-JPEG Detection Scheme Using Estimation of DC Coefficients“. In Information Systems Security, 307–23. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-36945-3_17.
Der volle Inhalt der QuelleBoroojeni, Kianoosh G., M. Hadi Amini und S. S. Iyengar. „Error Detection of DC Power Flow Using State Estimation“. In Smart Grids: Security and Privacy Issues, 31–51. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-45050-6_3.
Der volle Inhalt der QuelleMarten, Anne-Katrin, Dirk Westermann, Lorenzo Vento und Patrick Favre-Perrod. „Factors Influencing Oscillations within Meshed HVDC Grids and Implications for DC Voltage Control“. In Critical Information Infrastructures Security, 178–89. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-31664-2_19.
Der volle Inhalt der QuelleWang, Lirong. „Improved Method of Parallel DC-DC Boost Converter Based on Main Current Control“. In The 2021 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy, 566–74. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-89511-2_73.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "DC Security"
Gonzalez-Longatt, F., C. Carmona-Delgado, J. Riquelme, M. Burgos und J. L. Rueda. „Risk-based DC security assessment for future DC-independent system operator“. In 2015 International Conference on Energy Economics and Environment (ICEEE). IEEE, 2015. http://dx.doi.org/10.1109/energyeconomics.2015.7235101.
Der volle Inhalt der QuelleLewis, R. M., Hanhee Paik, S. K. Dutta, T. A. Palomaki, K. Mitra, B. K. Cooper, A. Przybysz, J. R. Anderson, C. J. Lobb und F. C. Wellstood. „Some properties of a dc SQUID qubit“. In Defense and Security Symposium, herausgegeben von Eric J. Donkor, Andrew R. Pirich und Howard E. Brandt. SPIE, 2006. http://dx.doi.org/10.1117/12.665081.
Der volle Inhalt der QuelleChoi, Won-seok, Hyun-suk Hwang und Hyun-il Kang. „Aging algorithm for DC Train Facilities“. In Information Security and Assurance 2014. Science & Engineering Research Support soCiety, 2014. http://dx.doi.org/10.14257/astl.2014.48.05.
Der volle Inhalt der QuelleZhong, Xingsi, Lu Yu, Richard Brooks und Ganesh Kumar Venayagamoorthy. „Cyber security in smart DC microgrid operations“. In 2015 IEEE First International Conference on DC Microgrids (ICDCM). IEEE, 2015. http://dx.doi.org/10.1109/icdcm.2015.7152015.
Der volle Inhalt der QuelleEriksson, Robert. „Security analysis of interconnected AC/DC systems“. In 2015 Australasian Universities Power Engineering Conference (AUPEC). IEEE, 2015. http://dx.doi.org/10.1109/aupec.2015.7324794.
Der volle Inhalt der QuelleChen, Weibo, Benjamin H. Cameron, Mark V. Zagarola und Sri R. Narayanan. „A high pressure ratio DC compressor for tactical cryocoolers“. In SPIE Defense + Security, herausgegeben von Richard I. Epstein, Bjørn F. Andresen, Markus P. Hehlen, Joseph P. Heremans, Ingo N. Rühlich und Mansoor Sheik-Bahae. SPIE, 2016. http://dx.doi.org/10.1117/12.2224731.
Der volle Inhalt der QuelleConroy, Joseph, Andrew Kehlenbeck, J. Sean Humbert und William Nothwang. „Characterization and enhancement of micro brushless DC motor response“. In SPIE Defense + Security, herausgegeben von Thomas George, M. Saif Islam und Achyut K. Dutta. SPIE, 2014. http://dx.doi.org/10.1117/12.2051263.
Der volle Inhalt der QuelleJevtic, Ruzica, Marko Ylitolva und Lauri Koskinen. „Reconfigurable Switched Capacitor DC-DC Converter for Improved Security in IoT Devices“. In 2018 28th International Symposium on Power and Timing Modeling, Optimization and Simulation (PATMOS). IEEE, 2018. http://dx.doi.org/10.1109/patmos.2018.8464158.
Der volle Inhalt der QuelleJat, C. K., V. Bhardwaj, H. Ergun und D. Van Hertem. „Security constrained OPF model for AC/DC grids with unbalanced DC systems“. In 19th International Conference on AC and DC Power Transmission (ACDC 2023). Institution of Engineering and Technology, 2023. http://dx.doi.org/10.1049/icp.2023.1342.
Der volle Inhalt der QuelleSmith, Barry. „Threat Detection DC to Daylight“. In Optical Solutions for Homeland and National Security. Washington, D.C.: OSA, 2005. http://dx.doi.org/10.1364/oshs.2005.thc3.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "DC Security"
Wei, Wenbin, Nigel Blampied und Raajmaathangi Sreevijay. Evaluation, Comparison, and Improvement Recommendations for Caltrans Financial Programming Processes and Tools. Mineta Transportation Institute, Februar 2023. http://dx.doi.org/10.31979/mti.2023.2058.
Der volle Inhalt der QuelleHealth hazard evaluation summary report: HETA-2003-0206-3067, evaluation of radiation exposure to TSA baggage screeners, Transportation Security Administration, Washington, DC. U.S. Department of Health and Human Services, Public Health Service, Centers for Disease Control and Prevention, National Institute for Occupational Safety and Health, August 2008. http://dx.doi.org/10.26616/nioshheta200302063067.
Der volle Inhalt der Quelle