Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 1 of 4912 results
Sort by: relevance publication year

Fostering Positive School Environments: Physical and Virtual

BOOK CHAPTER published 12 January 2009 in Confronting Cyber-Bullying

Stability of Interval Positive Systems with Delays

PROCEEDINGS ARTICLE published July 2017 in 2017 IEEE 7th Annual International Conference on CYBER Technology in Automation, Control, and Intelligent Systems (CYBER)

Authors: Zhe Li | Kai Pan | Yang Yang

Stabilization for delayed positive nonlinear systems via T-S fuzzy modeling

PROCEEDINGS ARTICLE published June 2015 in 2015 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER)

Authors: Yunfei Yin | Xiaolong Zheng | Haijiao Yang | Xudong Zhao

Digital Fast Charging System with Positive and Negative Pulse

PROCEEDINGS ARTICLE published July 2017 in 2017 IEEE 7th Annual International Conference on CYBER Technology in Automation, Control, and Intelligent Systems (CYBER)

Authors: Kaiyuan Wu | Zuwei He | Tong Yin | Tao Zhang

Access Control Models

BOOK CHAPTER published in Cyber Warfare and Cyber Terrorism

Authors: Romuald Thion

Access Control Models

BOOK CHAPTER published 2007 in Cyber Warfare and Cyber Terrorism

Authors: Romuald Thion

Stability Analysis and Impulsive Controller Design for Positive Interval Type-2 Polynomial Fuzzy Systems with Input Saturation

PROCEEDINGS ARTICLE published 11 July 2023 in 2023 IEEE 13th International Conference on CYBER Technology in Automation, Control, and Intelligent Systems (CYBER)

Authors: Meng Han | Yongjie Huang | Ge Guo | Zhengsong Wang

IDENTITY AND ACCESS CONTROL

BOOK CHAPTER published 10 August 2023 in Cyber resilience

Taking Control

BOOK CHAPTER published 2005 in Cyber Spying

Authors: Ted Fair | Michael Nordfelt | Sandra Ring | Eric Cole

Content-Based Policy Specification for Multimedia Authorization and Access Control Model

BOOK CHAPTER published in Cyber Warfare and Cyber Terrorism

Authors: Bechara Al Bouna | Richard Chbeir

Dynamic Control Mechanisms for User Privacy Enhancement

BOOK CHAPTER published in Cyber Crime

Authors: Amr Ali Eldin

Content-Based Policy Specification for Multimedia Authorization and Access Control Model

BOOK CHAPTER published 2007 in Cyber Warfare and Cyber Terrorism

Authors: Bechara Al Bouna | Richard Chbeir

TECHNICAL CONTROL THEMES

BOOK CHAPTER published 11 July 2023 in Cyber Essentials

Dynamic Control Mechanisms for User Privacy Enhancement

BOOK CHAPTER published in Cyber Crime

Authors: Amr Ali Eldin

Operational technology, industrial control systems, and cyber forensics

BOOK CHAPTER published 26 July 2021 in Cyber Forensics

Authors: Albert J. Marcella

Informationized Conflict: Maintaining Party Control amid the Information Revolution

OTHER published 2016 in Cyber Dragon

A Policy-Based Security Framework for Privacy-Enhancing Data Access and Usage Control in Grids

BOOK CHAPTER published in Cyber Crime

Authors: Wolfgang Hommel

Vision-based trajectory tracking control of quadrotors using super twisting sliding mode control

JOURNAL ARTICLE published 1 October 2020 in Cyber-Physical Systems

Research funded by National Natural Science Foundation of China (61751305,61673176) | Programme of Introducing Talents of Discipline to Universities (B17017) | National Key Research and Development Program of China (2018YFC0809302)

Authors: Wenhui Wu | Xin Jin | Yang Tang

The General Theory of Crime and Computer Hacking

BOOK CHAPTER published in Cyber Crime

Authors: Adam M. Bossler | George W. Burruss

A Policy-Based Security Framework for Privacy-Enhancing Data Access and Usage Control in Grids

BOOK CHAPTER published in Cyber Crime

Authors: Wolfgang Hommel