Добірка наукової літератури з теми "DC Security"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "DC Security".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "DC Security":
Turner, Billy G. "SECURITY: VA to DC." Proceedings of the Water Environment Federation 2006, no. 1 (January 1, 2006): 810–18. http://dx.doi.org/10.2175/193864706783789572.
Natsios, Deborah. "National Security Sprawl: Washington DC." Architectural Design 75, no. 6 (November 2005): 80–85. http://dx.doi.org/10.1002/ad.179.
Ansari, Sakil Ahmad, and Jaychand Vishwakarma. "Survey on Database Concurrency Control in Multilevel Secure Database Management Systems." International Journal of Advanced Research in Computer Science and Software Engineering 8, no. 4 (April 30, 2018): 105. http://dx.doi.org/10.23956/ijarcsse.v8i4.645.
Haval, Abhijeet Madhukar. "Integration of Nonlinear Dynamics in Blockchain Security Protocols." Advances in Nonlinear Variational Inequalities 26, no. 2 (June 30, 2023): 94–109. http://dx.doi.org/10.52783/anvi.v26.i2.286.
Wang, Zhuodi, Kejun Li, Jun Liang, Kaiqi Sun, Jinyu Wang, and Zhijie Liu. "Coordinated Control Strategy of CU-MTDC under Abnormal Conditions Considering Power Supply Security." Applied Sciences 11, no. 4 (February 8, 2021): 1539. http://dx.doi.org/10.3390/app11041539.
Ge, Huiyang, Hongbin Sun, and Bin Wang. "Multi-scale AC−DC system voltage security regions." Journal of Engineering 2019, no. 16 (March 1, 2019): 3354–58. http://dx.doi.org/10.1049/joe.2018.8592.
Drew, Michael E. "Covid-19, Investment Risk, and Retirement Security." Financial Planning Research Journal 6, no. 1 (December 1, 2020): 8–20. http://dx.doi.org/10.2478/fprj-2020-0001.
Hussain, Talha, Rizwan Bin Faiz, Mohammad Aljaidi, Adnan Khattak, Ghassan Samara, Ayoub Alsarhan, and Raed Alazaidah. "Maximizing Test Coverage for Security Threats Using Optimal Test Data Generation." Applied Sciences 13, no. 14 (July 16, 2023): 8252. http://dx.doi.org/10.3390/app13148252.
Goodman, J., A. P. Dancy, and A. P. Chandrakasan. "An energy/security scalable encryption processor using an embedded variable voltage DC/DC converter." IEEE Journal of Solid-State Circuits 33, no. 11 (1998): 1799–809. http://dx.doi.org/10.1109/4.726580.
WANG, Lan, Chuanyu WANG, and Juan XUE. "Optimal Investment of Defined Contribution Pension Based on Self-Protection and Minimum Security." Wuhan University Journal of Natural Sciences 28, no. 2 (April 2023): 129–40. http://dx.doi.org/10.1051/wujns/2023282129.
Дисертації з теми "DC Security":
Eriksson, Robert. "Security-centered Coordinated Control in AC/DC Transmission Systems." Licentiate thesis, Stockholm : Royal Institute of Technology, 2008. http://kth.diva-portal.org/smash/record.jsf?searchId=4&pid=diva2:101.
Stevens, Phillip W. "Considering security in Florida's transportation project development process." [Tampa, Fla] : University of South Florida, 2006. http://purl.fcla.edu/usf/dc/et/SFE0001508.
Register, David Lain Brian. "Programming homeland security citizen preparedness and the threat of terrorism /." [Denton, Tex.] : University of North Texas, 2007. http://digital.library.unt.edu/permalink/meta-dc-3922.
Fernandopulle, Nilkamal Alden Robert T. H. Findlay Raymond D. Tang Chi-keung. "Improved dynamic security assessment for AC/DC power systems using transient energy functions." *McMaster only, 2005.
Mohanty, Pranab. "Learning from biometric distances : performance and security related issues in face recognition systems." [Tampa, Fla.] : University of South Florida, 2007. http://purl.fcla.edu/usf/dc/et/SFE0002298.
Schuessler, Joseph H. Windsor John C. "General deterrence theory assessing information systems security effectiveness in large versus small businesses /." [Denton, Tex.] : University of North Texas, 2009. http://digital.library.unt.edu/permalink/meta-dc-9829.
Young, Randall Frederick Windsor John C. "Defining the information security posture an empirical examination of structure, integration and managerial effectiveness /." [Denton, Tex.] : University of North Texas, 2008. http://digital.library.unt.edu/permalink/meta-dc-9006.
Pati, Nishikanta Guturu Parthasarathy. "Occlusion tolerant object recognition methods for video surveillance and tracking of moving civilian vehicles." [Denton, Tex.] : University of North Texas, 2007. http://digital.library.unt.edu/permalink/meta-dc-5133.
Meyer, Aric Tobolowsky Peggy M. "FISA and warrantless wire-tapping does FISA conform to fourth amendment standards? /." [Denton, Tex.] : University of North Texas, 2009. http://digital.library.unt.edu/permalink/meta-dc-9838.
Huang, Jian Li Hao. "FPGA implementations of elliptic curve cryptography and Tate pairing over binary field." [Denton, Tex.] : University of North Texas, 2007. http://digital.library.unt.edu/permalink/meta-dc-3963.
Книги з теми "DC Security":
DARPA Information Survivability Conference & Exposition (3rd 2003 Washington, D.C.). Proceedings: DARPA Information Survivability Conference and Exposition : Washington, DC, April 22-24, 2003. Los Alamitos, Calif: IEEE Computer Society, 2003.
ACM, Workshop on Rapid Malcode (1st 2003 Washington D. C. ). WORM '03: Proceedings of the 2003 ACM Workshop on Rapid Malcode : Washington, DC, USA, October 27, 2003. New York, N.Y: Association for Computing Machinery, 2003.
United States. Congress. Senate. Committee on Appropriations. Homeland security: Hearings before the Committee on Appropriations, United States Senate, One Hundred Seventh Congress, second session : special hearings, April 10, 2002, Washington, DC; April 11, 2002, Washington, DC. Washington: U.S. G.P.O., 2002.
ACM, Conference on Computer and Communications Security (10th 2003 Washington D. C. ). Proceedings of the 10th ACM Conference on Computer and Communications Security: CCS 2003 : October 27-31, 2003, Washington, DC, USA. New York: ACM Press, 2003.
ACM Conference on Computer and Communications Security (9th 2002 Washington, D.C.). Proceedings of the 9th ACM Conference on Computer and Communications Security: CCS 2002 : November 18-22, 2002, Washington, DC, USA. New York: ACM Press, 2002.
Appropriations, United States Congress Senate Committee on. Homeland security and the fiscal year 2002 supplemental appropriations bill: Hearing before the Committee on Appropriations, United States Senate, One Hundred Seventh Congress, second session, special hearings, April 30, 2002, Washington, DC; May 2, 2002, Washington, DC; May 7, 2002, Washington, DC. Washington: U.S. G.P.O., 2003.
D.C.) IEEE International Conference on Intelligence and Security Informatics (2012 Washington. 2012 IEEE International Conference on Intelligence and Security Informatics (ISI 2012): Washington, DC, USA, 11-14 June 2012. Piscataway, NJ: IEEE, 2012.
D.C.) ACM Workshop on Rapid Malcode (2nd 2004 Washington. WORM '04: Proceedings of the 2004 ACM Workshop on Rapid Malcode : Washington, DC, USA, October 29, 2004, co-located with CSS 2004. New York, N.Y: Association for Computing Machinery, 2004.
United States. Congress. Senate. Committee on Appropriations. Supplemental appropriations for fiscal year 2006: Hearings before the Committee on Appropriations, United States Senate, One Hundred Ninth Congress, second session, special hearings, March 7, 2006, Washington, DC, March 8, 2006, Washington, DC, March 9, 2006, Washington DC. Washington: U.S. G.P.O., 2007.
United States. Congress. House. Permanent Select Committee on Intelligence. Subcommittee on Intelligence Community Management. Security clearance reform: Hearing before the Subcommittee on Intelligence Community Management of the Permanent Select Committee on Intelligence, One Hundred Tenth Congress, first session, hearing held in Washington, DC, February 27, 2008. Washington: U.S. G.P.O., 2008.
Частини книг з теми "DC Security":
Bleumer, Gerrit. "DC Network." In Encyclopedia of Cryptography and Security, 313–15. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_194.
Bleumer, Gerrit. "Dining Cryptographers (DC) Network." In Encyclopedia of Cryptography, Security and Privacy, 1–3. Berlin, Heidelberg: Springer Berlin Heidelberg, 2023. http://dx.doi.org/10.1007/978-3-642-27739-9_194-2.
Zheng, Kai, Xiang Yao, and Wei Wang. "Reliability Evaluation of Smart DC Microgrid." In Advances in Artificial Intelligence and Security, 595–605. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-06764-8_46.
Karpaga Priya, R., S. Kavitha, M. Malathi, P. Sinthia, and K. Suresh Kumar. "Single-Phase Bi-Directional AC/DC Converters for Fast DC Bus Voltage Controller." In Emerging Trends in Expert Applications and Security, 33–44. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-1946-8_4.
Waye, Lucas, Pablo Buiras, Dan King, Stephen Chong, and Alejandro Russo. "It’s My Privilege: Controlling Downgrading in DC-Labels." In Security and Trust Management, 203–19. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-24858-5_13.
Li, Long-Hai, Cheng-Qiang Huang, and Shao-Feng Fu. "Boardroom Voting Scheme with Unconditionally Secret Ballots Based on DC-Net." In Network and System Security, 220–32. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34601-9_17.
Bhaduri Mandal, Arkaprava, and Tanmoy Kanti Das. "Anti-forensics of a NAD-JPEG Detection Scheme Using Estimation of DC Coefficients." In Information Systems Security, 307–23. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-36945-3_17.
Boroojeni, Kianoosh G., M. Hadi Amini, and S. S. Iyengar. "Error Detection of DC Power Flow Using State Estimation." In Smart Grids: Security and Privacy Issues, 31–51. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-45050-6_3.
Marten, Anne-Katrin, Dirk Westermann, Lorenzo Vento, and Patrick Favre-Perrod. "Factors Influencing Oscillations within Meshed HVDC Grids and Implications for DC Voltage Control." In Critical Information Infrastructures Security, 178–89. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-31664-2_19.
Wang, Lirong. "Improved Method of Parallel DC-DC Boost Converter Based on Main Current Control." In The 2021 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy, 566–74. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-89511-2_73.
Тези доповідей конференцій з теми "DC Security":
Gonzalez-Longatt, F., C. Carmona-Delgado, J. Riquelme, M. Burgos, and J. L. Rueda. "Risk-based DC security assessment for future DC-independent system operator." In 2015 International Conference on Energy Economics and Environment (ICEEE). IEEE, 2015. http://dx.doi.org/10.1109/energyeconomics.2015.7235101.
Lewis, R. M., Hanhee Paik, S. K. Dutta, T. A. Palomaki, K. Mitra, B. K. Cooper, A. Przybysz, J. R. Anderson, C. J. Lobb, and F. C. Wellstood. "Some properties of a dc SQUID qubit." In Defense and Security Symposium, edited by Eric J. Donkor, Andrew R. Pirich, and Howard E. Brandt. SPIE, 2006. http://dx.doi.org/10.1117/12.665081.
Choi, Won-seok, Hyun-suk Hwang, and Hyun-il Kang. "Aging algorithm for DC Train Facilities." In Information Security and Assurance 2014. Science & Engineering Research Support soCiety, 2014. http://dx.doi.org/10.14257/astl.2014.48.05.
Zhong, Xingsi, Lu Yu, Richard Brooks, and Ganesh Kumar Venayagamoorthy. "Cyber security in smart DC microgrid operations." In 2015 IEEE First International Conference on DC Microgrids (ICDCM). IEEE, 2015. http://dx.doi.org/10.1109/icdcm.2015.7152015.
Eriksson, Robert. "Security analysis of interconnected AC/DC systems." In 2015 Australasian Universities Power Engineering Conference (AUPEC). IEEE, 2015. http://dx.doi.org/10.1109/aupec.2015.7324794.
Chen, Weibo, Benjamin H. Cameron, Mark V. Zagarola, and Sri R. Narayanan. "A high pressure ratio DC compressor for tactical cryocoolers." In SPIE Defense + Security, edited by Richard I. Epstein, Bjørn F. Andresen, Markus P. Hehlen, Joseph P. Heremans, Ingo N. Rühlich, and Mansoor Sheik-Bahae. SPIE, 2016. http://dx.doi.org/10.1117/12.2224731.
Conroy, Joseph, Andrew Kehlenbeck, J. Sean Humbert, and William Nothwang. "Characterization and enhancement of micro brushless DC motor response." In SPIE Defense + Security, edited by Thomas George, M. Saif Islam, and Achyut K. Dutta. SPIE, 2014. http://dx.doi.org/10.1117/12.2051263.
Jevtic, Ruzica, Marko Ylitolva, and Lauri Koskinen. "Reconfigurable Switched Capacitor DC-DC Converter for Improved Security in IoT Devices." In 2018 28th International Symposium on Power and Timing Modeling, Optimization and Simulation (PATMOS). IEEE, 2018. http://dx.doi.org/10.1109/patmos.2018.8464158.
Jat, C. K., V. Bhardwaj, H. Ergun, and D. Van Hertem. "Security constrained OPF model for AC/DC grids with unbalanced DC systems." In 19th International Conference on AC and DC Power Transmission (ACDC 2023). Institution of Engineering and Technology, 2023. http://dx.doi.org/10.1049/icp.2023.1342.
Smith, Barry. "Threat Detection DC to Daylight." In Optical Solutions for Homeland and National Security. Washington, D.C.: OSA, 2005. http://dx.doi.org/10.1364/oshs.2005.thc3.
Звіти організацій з теми "DC Security":
Wei, Wenbin, Nigel Blampied, and Raajmaathangi Sreevijay. Evaluation, Comparison, and Improvement Recommendations for Caltrans Financial Programming Processes and Tools. Mineta Transportation Institute, February 2023. http://dx.doi.org/10.31979/mti.2023.2058.
Health hazard evaluation summary report: HETA-2003-0206-3067, evaluation of radiation exposure to TSA baggage screeners, Transportation Security Administration, Washington, DC. U.S. Department of Health and Human Services, Public Health Service, Centers for Disease Control and Prevention, National Institute for Occupational Safety and Health, August 2008. http://dx.doi.org/10.26616/nioshheta200302063067.