Gotowa bibliografia na temat „DC Security”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „DC Security”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "DC Security"
Turner, Billy G. "SECURITY: VA to DC". Proceedings of the Water Environment Federation 2006, nr 1 (1.01.2006): 810–18. http://dx.doi.org/10.2175/193864706783789572.
Pełny tekst źródłaNatsios, Deborah. "National Security Sprawl: Washington DC". Architectural Design 75, nr 6 (listopad 2005): 80–85. http://dx.doi.org/10.1002/ad.179.
Pełny tekst źródłaAnsari, Sakil Ahmad, i Jaychand Vishwakarma. "Survey on Database Concurrency Control in Multilevel Secure Database Management Systems". International Journal of Advanced Research in Computer Science and Software Engineering 8, nr 4 (30.04.2018): 105. http://dx.doi.org/10.23956/ijarcsse.v8i4.645.
Pełny tekst źródłaHaval, Abhijeet Madhukar. "Integration of Nonlinear Dynamics in Blockchain Security Protocols". Advances in Nonlinear Variational Inequalities 26, nr 2 (30.06.2023): 94–109. http://dx.doi.org/10.52783/anvi.v26.i2.286.
Pełny tekst źródłaWang, Zhuodi, Kejun Li, Jun Liang, Kaiqi Sun, Jinyu Wang i Zhijie Liu. "Coordinated Control Strategy of CU-MTDC under Abnormal Conditions Considering Power Supply Security". Applied Sciences 11, nr 4 (8.02.2021): 1539. http://dx.doi.org/10.3390/app11041539.
Pełny tekst źródłaGe, Huiyang, Hongbin Sun i Bin Wang. "Multi-scale AC−DC system voltage security regions". Journal of Engineering 2019, nr 16 (1.03.2019): 3354–58. http://dx.doi.org/10.1049/joe.2018.8592.
Pełny tekst źródłaDrew, Michael E. "Covid-19, Investment Risk, and Retirement Security". Financial Planning Research Journal 6, nr 1 (1.12.2020): 8–20. http://dx.doi.org/10.2478/fprj-2020-0001.
Pełny tekst źródłaHussain, Talha, Rizwan Bin Faiz, Mohammad Aljaidi, Adnan Khattak, Ghassan Samara, Ayoub Alsarhan i Raed Alazaidah. "Maximizing Test Coverage for Security Threats Using Optimal Test Data Generation". Applied Sciences 13, nr 14 (16.07.2023): 8252. http://dx.doi.org/10.3390/app13148252.
Pełny tekst źródłaGoodman, J., A. P. Dancy i A. P. Chandrakasan. "An energy/security scalable encryption processor using an embedded variable voltage DC/DC converter". IEEE Journal of Solid-State Circuits 33, nr 11 (1998): 1799–809. http://dx.doi.org/10.1109/4.726580.
Pełny tekst źródłaWANG, Lan, Chuanyu WANG i Juan XUE. "Optimal Investment of Defined Contribution Pension Based on Self-Protection and Minimum Security". Wuhan University Journal of Natural Sciences 28, nr 2 (kwiecień 2023): 129–40. http://dx.doi.org/10.1051/wujns/2023282129.
Pełny tekst źródłaRozprawy doktorskie na temat "DC Security"
Eriksson, Robert. "Security-centered Coordinated Control in AC/DC Transmission Systems". Licentiate thesis, Stockholm : Royal Institute of Technology, 2008. http://kth.diva-portal.org/smash/record.jsf?searchId=4&pid=diva2:101.
Pełny tekst źródłaStevens, Phillip W. "Considering security in Florida's transportation project development process". [Tampa, Fla] : University of South Florida, 2006. http://purl.fcla.edu/usf/dc/et/SFE0001508.
Pełny tekst źródłaRegister, David Lain Brian. "Programming homeland security citizen preparedness and the threat of terrorism /". [Denton, Tex.] : University of North Texas, 2007. http://digital.library.unt.edu/permalink/meta-dc-3922.
Pełny tekst źródłaFernandopulle, Nilkamal Alden Robert T. H. Findlay Raymond D. Tang Chi-keung. "Improved dynamic security assessment for AC/DC power systems using transient energy functions". *McMaster only, 2005.
Znajdź pełny tekst źródłaMohanty, Pranab. "Learning from biometric distances : performance and security related issues in face recognition systems". [Tampa, Fla.] : University of South Florida, 2007. http://purl.fcla.edu/usf/dc/et/SFE0002298.
Pełny tekst źródłaSchuessler, Joseph H. Windsor John C. "General deterrence theory assessing information systems security effectiveness in large versus small businesses /". [Denton, Tex.] : University of North Texas, 2009. http://digital.library.unt.edu/permalink/meta-dc-9829.
Pełny tekst źródłaYoung, Randall Frederick Windsor John C. "Defining the information security posture an empirical examination of structure, integration and managerial effectiveness /". [Denton, Tex.] : University of North Texas, 2008. http://digital.library.unt.edu/permalink/meta-dc-9006.
Pełny tekst źródłaPati, Nishikanta Guturu Parthasarathy. "Occlusion tolerant object recognition methods for video surveillance and tracking of moving civilian vehicles". [Denton, Tex.] : University of North Texas, 2007. http://digital.library.unt.edu/permalink/meta-dc-5133.
Pełny tekst źródłaMeyer, Aric Tobolowsky Peggy M. "FISA and warrantless wire-tapping does FISA conform to fourth amendment standards? /". [Denton, Tex.] : University of North Texas, 2009. http://digital.library.unt.edu/permalink/meta-dc-9838.
Pełny tekst źródłaHuang, Jian Li Hao. "FPGA implementations of elliptic curve cryptography and Tate pairing over binary field". [Denton, Tex.] : University of North Texas, 2007. http://digital.library.unt.edu/permalink/meta-dc-3963.
Pełny tekst źródłaKsiążki na temat "DC Security"
DARPA Information Survivability Conference & Exposition (3rd 2003 Washington, D.C.). Proceedings: DARPA Information Survivability Conference and Exposition : Washington, DC, April 22-24, 2003. Los Alamitos, Calif: IEEE Computer Society, 2003.
Znajdź pełny tekst źródłaACM, Workshop on Rapid Malcode (1st 2003 Washington D. C. ). WORM '03: Proceedings of the 2003 ACM Workshop on Rapid Malcode : Washington, DC, USA, October 27, 2003. New York, N.Y: Association for Computing Machinery, 2003.
Znajdź pełny tekst źródłaUnited States. Congress. Senate. Committee on Appropriations. Homeland security: Hearings before the Committee on Appropriations, United States Senate, One Hundred Seventh Congress, second session : special hearings, April 10, 2002, Washington, DC; April 11, 2002, Washington, DC. Washington: U.S. G.P.O., 2002.
Znajdź pełny tekst źródłaACM, Conference on Computer and Communications Security (10th 2003 Washington D. C. ). Proceedings of the 10th ACM Conference on Computer and Communications Security: CCS 2003 : October 27-31, 2003, Washington, DC, USA. New York: ACM Press, 2003.
Znajdź pełny tekst źródłaACM Conference on Computer and Communications Security (9th 2002 Washington, D.C.). Proceedings of the 9th ACM Conference on Computer and Communications Security: CCS 2002 : November 18-22, 2002, Washington, DC, USA. New York: ACM Press, 2002.
Znajdź pełny tekst źródłaAppropriations, United States Congress Senate Committee on. Homeland security and the fiscal year 2002 supplemental appropriations bill: Hearing before the Committee on Appropriations, United States Senate, One Hundred Seventh Congress, second session, special hearings, April 30, 2002, Washington, DC; May 2, 2002, Washington, DC; May 7, 2002, Washington, DC. Washington: U.S. G.P.O., 2003.
Znajdź pełny tekst źródłaD.C.) IEEE International Conference on Intelligence and Security Informatics (2012 Washington. 2012 IEEE International Conference on Intelligence and Security Informatics (ISI 2012): Washington, DC, USA, 11-14 June 2012. Piscataway, NJ: IEEE, 2012.
Znajdź pełny tekst źródłaD.C.) ACM Workshop on Rapid Malcode (2nd 2004 Washington. WORM '04: Proceedings of the 2004 ACM Workshop on Rapid Malcode : Washington, DC, USA, October 29, 2004, co-located with CSS 2004. New York, N.Y: Association for Computing Machinery, 2004.
Znajdź pełny tekst źródłaUnited States. Congress. Senate. Committee on Appropriations. Supplemental appropriations for fiscal year 2006: Hearings before the Committee on Appropriations, United States Senate, One Hundred Ninth Congress, second session, special hearings, March 7, 2006, Washington, DC, March 8, 2006, Washington, DC, March 9, 2006, Washington DC. Washington: U.S. G.P.O., 2007.
Znajdź pełny tekst źródłaUnited States. Congress. House. Permanent Select Committee on Intelligence. Subcommittee on Intelligence Community Management. Security clearance reform: Hearing before the Subcommittee on Intelligence Community Management of the Permanent Select Committee on Intelligence, One Hundred Tenth Congress, first session, hearing held in Washington, DC, February 27, 2008. Washington: U.S. G.P.O., 2008.
Znajdź pełny tekst źródłaCzęści książek na temat "DC Security"
Bleumer, Gerrit. "DC Network". W Encyclopedia of Cryptography and Security, 313–15. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_194.
Pełny tekst źródłaBleumer, Gerrit. "Dining Cryptographers (DC) Network". W Encyclopedia of Cryptography, Security and Privacy, 1–3. Berlin, Heidelberg: Springer Berlin Heidelberg, 2023. http://dx.doi.org/10.1007/978-3-642-27739-9_194-2.
Pełny tekst źródłaZheng, Kai, Xiang Yao i Wei Wang. "Reliability Evaluation of Smart DC Microgrid". W Advances in Artificial Intelligence and Security, 595–605. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-06764-8_46.
Pełny tekst źródłaKarpaga Priya, R., S. Kavitha, M. Malathi, P. Sinthia i K. Suresh Kumar. "Single-Phase Bi-Directional AC/DC Converters for Fast DC Bus Voltage Controller". W Emerging Trends in Expert Applications and Security, 33–44. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-1946-8_4.
Pełny tekst źródłaWaye, Lucas, Pablo Buiras, Dan King, Stephen Chong i Alejandro Russo. "It’s My Privilege: Controlling Downgrading in DC-Labels". W Security and Trust Management, 203–19. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-24858-5_13.
Pełny tekst źródłaLi, Long-Hai, Cheng-Qiang Huang i Shao-Feng Fu. "Boardroom Voting Scheme with Unconditionally Secret Ballots Based on DC-Net". W Network and System Security, 220–32. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34601-9_17.
Pełny tekst źródłaBhaduri Mandal, Arkaprava, i Tanmoy Kanti Das. "Anti-forensics of a NAD-JPEG Detection Scheme Using Estimation of DC Coefficients". W Information Systems Security, 307–23. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-36945-3_17.
Pełny tekst źródłaBoroojeni, Kianoosh G., M. Hadi Amini i S. S. Iyengar. "Error Detection of DC Power Flow Using State Estimation". W Smart Grids: Security and Privacy Issues, 31–51. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-45050-6_3.
Pełny tekst źródłaMarten, Anne-Katrin, Dirk Westermann, Lorenzo Vento i Patrick Favre-Perrod. "Factors Influencing Oscillations within Meshed HVDC Grids and Implications for DC Voltage Control". W Critical Information Infrastructures Security, 178–89. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-31664-2_19.
Pełny tekst źródłaWang, Lirong. "Improved Method of Parallel DC-DC Boost Converter Based on Main Current Control". W The 2021 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy, 566–74. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-89511-2_73.
Pełny tekst źródłaStreszczenia konferencji na temat "DC Security"
Gonzalez-Longatt, F., C. Carmona-Delgado, J. Riquelme, M. Burgos i J. L. Rueda. "Risk-based DC security assessment for future DC-independent system operator". W 2015 International Conference on Energy Economics and Environment (ICEEE). IEEE, 2015. http://dx.doi.org/10.1109/energyeconomics.2015.7235101.
Pełny tekst źródłaLewis, R. M., Hanhee Paik, S. K. Dutta, T. A. Palomaki, K. Mitra, B. K. Cooper, A. Przybysz, J. R. Anderson, C. J. Lobb i F. C. Wellstood. "Some properties of a dc SQUID qubit". W Defense and Security Symposium, redaktorzy Eric J. Donkor, Andrew R. Pirich i Howard E. Brandt. SPIE, 2006. http://dx.doi.org/10.1117/12.665081.
Pełny tekst źródłaChoi, Won-seok, Hyun-suk Hwang i Hyun-il Kang. "Aging algorithm for DC Train Facilities". W Information Security and Assurance 2014. Science & Engineering Research Support soCiety, 2014. http://dx.doi.org/10.14257/astl.2014.48.05.
Pełny tekst źródłaZhong, Xingsi, Lu Yu, Richard Brooks i Ganesh Kumar Venayagamoorthy. "Cyber security in smart DC microgrid operations". W 2015 IEEE First International Conference on DC Microgrids (ICDCM). IEEE, 2015. http://dx.doi.org/10.1109/icdcm.2015.7152015.
Pełny tekst źródłaEriksson, Robert. "Security analysis of interconnected AC/DC systems". W 2015 Australasian Universities Power Engineering Conference (AUPEC). IEEE, 2015. http://dx.doi.org/10.1109/aupec.2015.7324794.
Pełny tekst źródłaChen, Weibo, Benjamin H. Cameron, Mark V. Zagarola i Sri R. Narayanan. "A high pressure ratio DC compressor for tactical cryocoolers". W SPIE Defense + Security, redaktorzy Richard I. Epstein, Bjørn F. Andresen, Markus P. Hehlen, Joseph P. Heremans, Ingo N. Rühlich i Mansoor Sheik-Bahae. SPIE, 2016. http://dx.doi.org/10.1117/12.2224731.
Pełny tekst źródłaConroy, Joseph, Andrew Kehlenbeck, J. Sean Humbert i William Nothwang. "Characterization and enhancement of micro brushless DC motor response". W SPIE Defense + Security, redaktorzy Thomas George, M. Saif Islam i Achyut K. Dutta. SPIE, 2014. http://dx.doi.org/10.1117/12.2051263.
Pełny tekst źródłaJevtic, Ruzica, Marko Ylitolva i Lauri Koskinen. "Reconfigurable Switched Capacitor DC-DC Converter for Improved Security in IoT Devices". W 2018 28th International Symposium on Power and Timing Modeling, Optimization and Simulation (PATMOS). IEEE, 2018. http://dx.doi.org/10.1109/patmos.2018.8464158.
Pełny tekst źródłaJat, C. K., V. Bhardwaj, H. Ergun i D. Van Hertem. "Security constrained OPF model for AC/DC grids with unbalanced DC systems". W 19th International Conference on AC and DC Power Transmission (ACDC 2023). Institution of Engineering and Technology, 2023. http://dx.doi.org/10.1049/icp.2023.1342.
Pełny tekst źródłaSmith, Barry. "Threat Detection DC to Daylight". W Optical Solutions for Homeland and National Security. Washington, D.C.: OSA, 2005. http://dx.doi.org/10.1364/oshs.2005.thc3.
Pełny tekst źródłaRaporty organizacyjne na temat "DC Security"
Wei, Wenbin, Nigel Blampied i Raajmaathangi Sreevijay. Evaluation, Comparison, and Improvement Recommendations for Caltrans Financial Programming Processes and Tools. Mineta Transportation Institute, luty 2023. http://dx.doi.org/10.31979/mti.2023.2058.
Pełny tekst źródłaHealth hazard evaluation summary report: HETA-2003-0206-3067, evaluation of radiation exposure to TSA baggage screeners, Transportation Security Administration, Washington, DC. U.S. Department of Health and Human Services, Public Health Service, Centers for Disease Control and Prevention, National Institute for Occupational Safety and Health, sierpień 2008. http://dx.doi.org/10.26616/nioshheta200302063067.
Pełny tekst źródła