Literatura científica selecionada sobre o tema "DC Security"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Índice
Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "DC Security".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Artigos de revistas sobre o assunto "DC Security"
Turner, Billy G. "SECURITY: VA to DC". Proceedings of the Water Environment Federation 2006, n.º 1 (1 de janeiro de 2006): 810–18. http://dx.doi.org/10.2175/193864706783789572.
Texto completo da fonteNatsios, Deborah. "National Security Sprawl: Washington DC". Architectural Design 75, n.º 6 (novembro de 2005): 80–85. http://dx.doi.org/10.1002/ad.179.
Texto completo da fonteAnsari, Sakil Ahmad, e Jaychand Vishwakarma. "Survey on Database Concurrency Control in Multilevel Secure Database Management Systems". International Journal of Advanced Research in Computer Science and Software Engineering 8, n.º 4 (30 de abril de 2018): 105. http://dx.doi.org/10.23956/ijarcsse.v8i4.645.
Texto completo da fonteHaval, Abhijeet Madhukar. "Integration of Nonlinear Dynamics in Blockchain Security Protocols". Advances in Nonlinear Variational Inequalities 26, n.º 2 (30 de junho de 2023): 94–109. http://dx.doi.org/10.52783/anvi.v26.i2.286.
Texto completo da fonteWang, Zhuodi, Kejun Li, Jun Liang, Kaiqi Sun, Jinyu Wang e Zhijie Liu. "Coordinated Control Strategy of CU-MTDC under Abnormal Conditions Considering Power Supply Security". Applied Sciences 11, n.º 4 (8 de fevereiro de 2021): 1539. http://dx.doi.org/10.3390/app11041539.
Texto completo da fonteGe, Huiyang, Hongbin Sun e Bin Wang. "Multi-scale AC−DC system voltage security regions". Journal of Engineering 2019, n.º 16 (1 de março de 2019): 3354–58. http://dx.doi.org/10.1049/joe.2018.8592.
Texto completo da fonteDrew, Michael E. "Covid-19, Investment Risk, and Retirement Security". Financial Planning Research Journal 6, n.º 1 (1 de dezembro de 2020): 8–20. http://dx.doi.org/10.2478/fprj-2020-0001.
Texto completo da fonteHussain, Talha, Rizwan Bin Faiz, Mohammad Aljaidi, Adnan Khattak, Ghassan Samara, Ayoub Alsarhan e Raed Alazaidah. "Maximizing Test Coverage for Security Threats Using Optimal Test Data Generation". Applied Sciences 13, n.º 14 (16 de julho de 2023): 8252. http://dx.doi.org/10.3390/app13148252.
Texto completo da fonteGoodman, J., A. P. Dancy e A. P. Chandrakasan. "An energy/security scalable encryption processor using an embedded variable voltage DC/DC converter". IEEE Journal of Solid-State Circuits 33, n.º 11 (1998): 1799–809. http://dx.doi.org/10.1109/4.726580.
Texto completo da fonteWANG, Lan, Chuanyu WANG e Juan XUE. "Optimal Investment of Defined Contribution Pension Based on Self-Protection and Minimum Security". Wuhan University Journal of Natural Sciences 28, n.º 2 (abril de 2023): 129–40. http://dx.doi.org/10.1051/wujns/2023282129.
Texto completo da fonteTeses / dissertações sobre o assunto "DC Security"
Eriksson, Robert. "Security-centered Coordinated Control in AC/DC Transmission Systems". Licentiate thesis, Stockholm : Royal Institute of Technology, 2008. http://kth.diva-portal.org/smash/record.jsf?searchId=4&pid=diva2:101.
Texto completo da fonteStevens, Phillip W. "Considering security in Florida's transportation project development process". [Tampa, Fla] : University of South Florida, 2006. http://purl.fcla.edu/usf/dc/et/SFE0001508.
Texto completo da fonteRegister, David Lain Brian. "Programming homeland security citizen preparedness and the threat of terrorism /". [Denton, Tex.] : University of North Texas, 2007. http://digital.library.unt.edu/permalink/meta-dc-3922.
Texto completo da fonteFernandopulle, Nilkamal Alden Robert T. H. Findlay Raymond D. Tang Chi-keung. "Improved dynamic security assessment for AC/DC power systems using transient energy functions". *McMaster only, 2005.
Encontre o texto completo da fonteMohanty, Pranab. "Learning from biometric distances : performance and security related issues in face recognition systems". [Tampa, Fla.] : University of South Florida, 2007. http://purl.fcla.edu/usf/dc/et/SFE0002298.
Texto completo da fonteSchuessler, Joseph H. Windsor John C. "General deterrence theory assessing information systems security effectiveness in large versus small businesses /". [Denton, Tex.] : University of North Texas, 2009. http://digital.library.unt.edu/permalink/meta-dc-9829.
Texto completo da fonteYoung, Randall Frederick Windsor John C. "Defining the information security posture an empirical examination of structure, integration and managerial effectiveness /". [Denton, Tex.] : University of North Texas, 2008. http://digital.library.unt.edu/permalink/meta-dc-9006.
Texto completo da fontePati, Nishikanta Guturu Parthasarathy. "Occlusion tolerant object recognition methods for video surveillance and tracking of moving civilian vehicles". [Denton, Tex.] : University of North Texas, 2007. http://digital.library.unt.edu/permalink/meta-dc-5133.
Texto completo da fonteMeyer, Aric Tobolowsky Peggy M. "FISA and warrantless wire-tapping does FISA conform to fourth amendment standards? /". [Denton, Tex.] : University of North Texas, 2009. http://digital.library.unt.edu/permalink/meta-dc-9838.
Texto completo da fonteHuang, Jian Li Hao. "FPGA implementations of elliptic curve cryptography and Tate pairing over binary field". [Denton, Tex.] : University of North Texas, 2007. http://digital.library.unt.edu/permalink/meta-dc-3963.
Texto completo da fonteLivros sobre o assunto "DC Security"
DARPA Information Survivability Conference & Exposition (3rd 2003 Washington, D.C.). Proceedings: DARPA Information Survivability Conference and Exposition : Washington, DC, April 22-24, 2003. Los Alamitos, Calif: IEEE Computer Society, 2003.
Encontre o texto completo da fonteACM, Workshop on Rapid Malcode (1st 2003 Washington D. C. ). WORM '03: Proceedings of the 2003 ACM Workshop on Rapid Malcode : Washington, DC, USA, October 27, 2003. New York, N.Y: Association for Computing Machinery, 2003.
Encontre o texto completo da fonteUnited States. Congress. Senate. Committee on Appropriations. Homeland security: Hearings before the Committee on Appropriations, United States Senate, One Hundred Seventh Congress, second session : special hearings, April 10, 2002, Washington, DC; April 11, 2002, Washington, DC. Washington: U.S. G.P.O., 2002.
Encontre o texto completo da fonteACM, Conference on Computer and Communications Security (10th 2003 Washington D. C. ). Proceedings of the 10th ACM Conference on Computer and Communications Security: CCS 2003 : October 27-31, 2003, Washington, DC, USA. New York: ACM Press, 2003.
Encontre o texto completo da fonteACM Conference on Computer and Communications Security (9th 2002 Washington, D.C.). Proceedings of the 9th ACM Conference on Computer and Communications Security: CCS 2002 : November 18-22, 2002, Washington, DC, USA. New York: ACM Press, 2002.
Encontre o texto completo da fonteAppropriations, United States Congress Senate Committee on. Homeland security and the fiscal year 2002 supplemental appropriations bill: Hearing before the Committee on Appropriations, United States Senate, One Hundred Seventh Congress, second session, special hearings, April 30, 2002, Washington, DC; May 2, 2002, Washington, DC; May 7, 2002, Washington, DC. Washington: U.S. G.P.O., 2003.
Encontre o texto completo da fonteD.C.) IEEE International Conference on Intelligence and Security Informatics (2012 Washington. 2012 IEEE International Conference on Intelligence and Security Informatics (ISI 2012): Washington, DC, USA, 11-14 June 2012. Piscataway, NJ: IEEE, 2012.
Encontre o texto completo da fonteD.C.) ACM Workshop on Rapid Malcode (2nd 2004 Washington. WORM '04: Proceedings of the 2004 ACM Workshop on Rapid Malcode : Washington, DC, USA, October 29, 2004, co-located with CSS 2004. New York, N.Y: Association for Computing Machinery, 2004.
Encontre o texto completo da fonteUnited States. Congress. Senate. Committee on Appropriations. Supplemental appropriations for fiscal year 2006: Hearings before the Committee on Appropriations, United States Senate, One Hundred Ninth Congress, second session, special hearings, March 7, 2006, Washington, DC, March 8, 2006, Washington, DC, March 9, 2006, Washington DC. Washington: U.S. G.P.O., 2007.
Encontre o texto completo da fonteUnited States. Congress. House. Permanent Select Committee on Intelligence. Subcommittee on Intelligence Community Management. Security clearance reform: Hearing before the Subcommittee on Intelligence Community Management of the Permanent Select Committee on Intelligence, One Hundred Tenth Congress, first session, hearing held in Washington, DC, February 27, 2008. Washington: U.S. G.P.O., 2008.
Encontre o texto completo da fonteCapítulos de livros sobre o assunto "DC Security"
Bleumer, Gerrit. "DC Network". In Encyclopedia of Cryptography and Security, 313–15. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_194.
Texto completo da fonteBleumer, Gerrit. "Dining Cryptographers (DC) Network". In Encyclopedia of Cryptography, Security and Privacy, 1–3. Berlin, Heidelberg: Springer Berlin Heidelberg, 2023. http://dx.doi.org/10.1007/978-3-642-27739-9_194-2.
Texto completo da fonteZheng, Kai, Xiang Yao e Wei Wang. "Reliability Evaluation of Smart DC Microgrid". In Advances in Artificial Intelligence and Security, 595–605. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-06764-8_46.
Texto completo da fonteKarpaga Priya, R., S. Kavitha, M. Malathi, P. Sinthia e K. Suresh Kumar. "Single-Phase Bi-Directional AC/DC Converters for Fast DC Bus Voltage Controller". In Emerging Trends in Expert Applications and Security, 33–44. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-1946-8_4.
Texto completo da fonteWaye, Lucas, Pablo Buiras, Dan King, Stephen Chong e Alejandro Russo. "It’s My Privilege: Controlling Downgrading in DC-Labels". In Security and Trust Management, 203–19. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-24858-5_13.
Texto completo da fonteLi, Long-Hai, Cheng-Qiang Huang e Shao-Feng Fu. "Boardroom Voting Scheme with Unconditionally Secret Ballots Based on DC-Net". In Network and System Security, 220–32. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34601-9_17.
Texto completo da fonteBhaduri Mandal, Arkaprava, e Tanmoy Kanti Das. "Anti-forensics of a NAD-JPEG Detection Scheme Using Estimation of DC Coefficients". In Information Systems Security, 307–23. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-36945-3_17.
Texto completo da fonteBoroojeni, Kianoosh G., M. Hadi Amini e S. S. Iyengar. "Error Detection of DC Power Flow Using State Estimation". In Smart Grids: Security and Privacy Issues, 31–51. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-45050-6_3.
Texto completo da fonteMarten, Anne-Katrin, Dirk Westermann, Lorenzo Vento e Patrick Favre-Perrod. "Factors Influencing Oscillations within Meshed HVDC Grids and Implications for DC Voltage Control". In Critical Information Infrastructures Security, 178–89. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-31664-2_19.
Texto completo da fonteWang, Lirong. "Improved Method of Parallel DC-DC Boost Converter Based on Main Current Control". In The 2021 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy, 566–74. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-89511-2_73.
Texto completo da fonteTrabalhos de conferências sobre o assunto "DC Security"
Gonzalez-Longatt, F., C. Carmona-Delgado, J. Riquelme, M. Burgos e J. L. Rueda. "Risk-based DC security assessment for future DC-independent system operator". In 2015 International Conference on Energy Economics and Environment (ICEEE). IEEE, 2015. http://dx.doi.org/10.1109/energyeconomics.2015.7235101.
Texto completo da fonteLewis, R. M., Hanhee Paik, S. K. Dutta, T. A. Palomaki, K. Mitra, B. K. Cooper, A. Przybysz, J. R. Anderson, C. J. Lobb e F. C. Wellstood. "Some properties of a dc SQUID qubit". In Defense and Security Symposium, editado por Eric J. Donkor, Andrew R. Pirich e Howard E. Brandt. SPIE, 2006. http://dx.doi.org/10.1117/12.665081.
Texto completo da fonteChoi, Won-seok, Hyun-suk Hwang e Hyun-il Kang. "Aging algorithm for DC Train Facilities". In Information Security and Assurance 2014. Science & Engineering Research Support soCiety, 2014. http://dx.doi.org/10.14257/astl.2014.48.05.
Texto completo da fonteZhong, Xingsi, Lu Yu, Richard Brooks e Ganesh Kumar Venayagamoorthy. "Cyber security in smart DC microgrid operations". In 2015 IEEE First International Conference on DC Microgrids (ICDCM). IEEE, 2015. http://dx.doi.org/10.1109/icdcm.2015.7152015.
Texto completo da fonteEriksson, Robert. "Security analysis of interconnected AC/DC systems". In 2015 Australasian Universities Power Engineering Conference (AUPEC). IEEE, 2015. http://dx.doi.org/10.1109/aupec.2015.7324794.
Texto completo da fonteChen, Weibo, Benjamin H. Cameron, Mark V. Zagarola e Sri R. Narayanan. "A high pressure ratio DC compressor for tactical cryocoolers". In SPIE Defense + Security, editado por Richard I. Epstein, Bjørn F. Andresen, Markus P. Hehlen, Joseph P. Heremans, Ingo N. Rühlich e Mansoor Sheik-Bahae. SPIE, 2016. http://dx.doi.org/10.1117/12.2224731.
Texto completo da fonteConroy, Joseph, Andrew Kehlenbeck, J. Sean Humbert e William Nothwang. "Characterization and enhancement of micro brushless DC motor response". In SPIE Defense + Security, editado por Thomas George, M. Saif Islam e Achyut K. Dutta. SPIE, 2014. http://dx.doi.org/10.1117/12.2051263.
Texto completo da fonteJevtic, Ruzica, Marko Ylitolva e Lauri Koskinen. "Reconfigurable Switched Capacitor DC-DC Converter for Improved Security in IoT Devices". In 2018 28th International Symposium on Power and Timing Modeling, Optimization and Simulation (PATMOS). IEEE, 2018. http://dx.doi.org/10.1109/patmos.2018.8464158.
Texto completo da fonteJat, C. K., V. Bhardwaj, H. Ergun e D. Van Hertem. "Security constrained OPF model for AC/DC grids with unbalanced DC systems". In 19th International Conference on AC and DC Power Transmission (ACDC 2023). Institution of Engineering and Technology, 2023. http://dx.doi.org/10.1049/icp.2023.1342.
Texto completo da fonteSmith, Barry. "Threat Detection DC to Daylight". In Optical Solutions for Homeland and National Security. Washington, D.C.: OSA, 2005. http://dx.doi.org/10.1364/oshs.2005.thc3.
Texto completo da fonteRelatórios de organizações sobre o assunto "DC Security"
Wei, Wenbin, Nigel Blampied e Raajmaathangi Sreevijay. Evaluation, Comparison, and Improvement Recommendations for Caltrans Financial Programming Processes and Tools. Mineta Transportation Institute, fevereiro de 2023. http://dx.doi.org/10.31979/mti.2023.2058.
Texto completo da fonteHealth hazard evaluation summary report: HETA-2003-0206-3067, evaluation of radiation exposure to TSA baggage screeners, Transportation Security Administration, Washington, DC. U.S. Department of Health and Human Services, Public Health Service, Centers for Disease Control and Prevention, National Institute for Occupational Safety and Health, agosto de 2008. http://dx.doi.org/10.26616/nioshheta200302063067.
Texto completo da fonte