Search

Your search keyword '"Operations security"' showing total 570 results

Search Constraints

Start Over You searched for: Descriptor "Operations security" Remove constraint Descriptor: "Operations security"
570 results on '"Operations security"'

Search Results

1. دور تطبيق معاييراألمن السيبراني على التميزالتنظيمي – دراسة ميدانية على أعضاء هيئة التدريس في جامعة طيبة باملدينة املنورة لعام –2023/202.

2. Strategic Social Media Management in Conflict Zones through the Analysis of the Intelligence Cycle: Lessons Learned from the Russo-Ukrainian Conflict.

3. Distribution System Operation With Renewables and Energy Storage: A Linear Programming Based Multistage Robust Feasibility Approach

4. Susceptibility of Large Wind Power Plants to Voltage Disturbances–Recommendations to Stakeholders

5. The research on intelligent cooperative combat of UAV cluster with multi-agent reinforcement learning

6. DEVELOPMENT OF OPEN ABDOMEN DEVICE BASED ON BIODESIGN METHODOLOGY

7. RV-TEE: secure cryptographic protocol execution based on runtime verification

8. Strategic Social Media Management in Conflict Zones through the Analysis of the Intelligence Cycle: Lessons Learned from the Russo-Ukrainian Conflict

9. SAIBERSOC: A Methodology and Tool for Experimenting with Security Operation Centers

10. The Improved Topology and Control Strategy for the HCLC in the Multiterminal Flexible DC Grid

11. Communication Vulnerabilities in Electric Mobility HCP Systems: A Semi-Quantitative Analysis

12. The Impact of Renewables on Operational Security: Operating Power Systems That Have Extremely High Penetrations of Nonsynchronous Renewable Sources

13. Operational Security: The Case of Texas

14. The Importance of the Three P's in the Investigation

15. Data-driven Probabilistic Static Security Assessment for Power System Operation Using High-order Moments

16. A Cloud-edge Cooperative Dispatching Method for Distribution Networks Considering Photovoltaic Generation Uncertainty

17. Security in IoT-Enabled Digital Twins of Maritime Transportation Systems

18. Day-ahead Risk-constrained Stochastic Scheduling of Multi-energy System

19. Assessing the Operation Security of Trade Enterprises in the Modern Business Environment

20. Аналіз основних методологічних засад, закладених у проєкт доктрини зі скритого управління військами (силами)

21. An overview of operational security considerations for husbanding service providers of the U.S. navy

22. Розробка моделі динаміки станів рекомендаційної системи в умовах інформаційних атак ін’єкцією профілів

23. Multi‐stage risk‐based dispatch considering short‐term reliability of transmission lines

24. Power System Intra-Interval Operational Security Under False Data Injection Attacks

25. Analysis and Design of Information Security Management System Based on ISO 27001: 2013 Using ANNEX Control (Case Study: District of Government of Bandung City)

26. A Novel Fault Diagnosis Method based on Stacked LSTM

27. STRATEGIC MANAGEMENT OF ECONOMIC SECURITY SYSTEM OF BUSINESS ENTITIES: THEORETICAL ASPECTS

28. PROSPECTIVE PROTECTION METHODS OF WINDOWS OPERATION SYSTEM

29. TRANSPARENT COGNITIVE TECHNOLOGIES TO ENSURE SUSTAINABLE SOCIETY DEVELOPMENT

30. Contemporary Physical Clone-Resistant Identity for IoTs and Emerging Technologies

31. Comprehensive Method for Determining Transformer Decommissioning Life Considering Economic Life and Physical Life

32. Steady-State and Dynamic Security Assessment for System Operation

33. Sanitizing the IoT Cyber Security Posture: An Operational CTI Feed Backed up by Internet Measurements

34. Cybersecurity economics – balancing operational security spending

35. Improve connections of the last transport services in metro by a new space-time bicriteria optimization method

36. The Impact of Ramp-Induced Data Attacks on Power System Operational Security

37. Fast Screening of High-Risk Lines Under False Data Injection Attacks

38. A Data-Driven Stackelberg Market Strategy for Demand Response-Enabled Distribution Systems

39. Two-stage distributionally robust coordinated scheduling for gas-electricity integrated energy system considering wind power uncertainty and reserve capacity configuration

40. The Soft Underbelly of Cloud Security

41. A Prediction Algorithm to Enhance Grid Resilience Toward Cyber Attacks in WAMCS Applications

42. Security Assessment for Cyber Physical Distribution Power System Under Intrusion Attacks

43. Turing Machine-Based Cross-Network Isolation and Data Exchange Theory Model

44. A Comprehensive Tutorial on Science DMZ

45. Analysis of Cloud Computing Security Based on SGX Enhanced National Secret Algorithm

46. The Analysis and Application of Decentralized Cyber Layer and Distributed Security Control for Interconnected Conurbation Grids under Catastrophic Cascading Failures

47. Status Perception Method of the Renewable Energy and Thermal Power Coupled System Based on Operation Security Region

48. Resilience Assessment in Electricity Critical Infrastructure from the Point of View of Converged Security

49. Informationssäkerhetsrisker och organisatoriska sanktioner vid användandet av privata smarta enheter i Försvarsmakten : En studie om användning av privata smarta enheter

50. On managing vulnerabilities in AI/ML systems

Catalog

Books, media, physical & digital resources