Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Security control framework“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Security control framework" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Security control framework"
Kumar, Harsh. "Cloud Compliance Security Optimization." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem49485.
Der volle Inhalt der QuelleWang, Yu Fei, Tao Zhang, Yuan Yuan Ma, and Bo Zhang. "An Information Security Assessments Framework for Power Control Systems." Advanced Materials Research 805-806 (September 2013): 980–84. http://dx.doi.org/10.4028/www.scientific.net/amr.805-806.980.
Der volle Inhalt der QuelleAl Ketbi, Maitha, Khaled Shuaib, Ezedin Barka, and Marton Gergely. "Establishing a Security Control Framework for Blockchain Technology." Interdisciplinary Journal of Information, Knowledge, and Management 16 (2021): 307–30. http://dx.doi.org/10.28945/4837.
Der volle Inhalt der QuelleAbdulrahman, H. Altalhi1 Zailani Mohamed Sidek2 Norjihan Abdul Ghani3 Fazidah Othman4 and Maged Abdelkhaleq Al-Sheshtawil5. "ENHANCING THE SECURITY FRAMEWORK SECURECLOUD WITH THE SWIFT IDENTITY MANAGEMENT FRAMEWORK." International Journal on Cloud Computing: Services and Architecture(IJCCSA) 2, February (2018): 01–07. https://doi.org/10.5281/zenodo.1444289.
Der volle Inhalt der QuelleJi, Kaining, Yitian Liu, and Changju Hu. "Design of Security Control Framework for Power System Microservices." Advances in Engineering Technology Research 13, no. 1 (2025): 777. https://doi.org/10.56028/aetr.13.1.777.2025.
Der volle Inhalt der QuelleKumar, Anurag, and Prof Bibha Kumari. "Implementing Privacy Preserving Techniques in Distributed Big Data Framework on Cloud Computing." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 008 (2024): 1–14. http://dx.doi.org/10.55041/ijsrem37051.
Der volle Inhalt der QuelleYogesh Kumar Bhardwaj. "Securing Generative AI: Navigating Data Security Challenges in the AI Era." Journal of Computer Science and Technology Studies 7, no. 4 (2025): 147–55. https://doi.org/10.32996/jcsts.2025.7.4.17.
Der volle Inhalt der QuelleAlshammari, Ahmad. "A Novel Security Framework to Mitigate and Avoid Unexpected Security Threats in Saudi Arabia." Engineering, Technology & Applied Science Research 13, no. 4 (2023): 11445–50. http://dx.doi.org/10.48084/etasr.6091.
Der volle Inhalt der QuelleXu, Mudi, Benfeng Chen, Zhizhong Tan, et al. "AHAC: Advanced Network-Hiding Access Control Framework." Applied Sciences 14, no. 13 (2024): 5593. http://dx.doi.org/10.3390/app14135593.
Der volle Inhalt der QuelleKalwani, Seema. "Quality Framework, Principles, control practices, benchmark, internal controls addressing needs of current world." International Journal of Multidisciplinary Research and Growth Evaluation 2, no. 4 (2021): 919–26. https://doi.org/10.54660/.ijmrge.2021.2.4.919-926.
Der volle Inhalt der QuelleDissertationen zum Thema "Security control framework"
Viljoen, Melanie. "A framework towards effective control in information security governance." Thesis, Nelson Mandela Metropolitan University, 2009. http://hdl.handle.net/10948/887.
Der volle Inhalt der QuelleBenjuma, Nuria Mahmud. "An educational framework to support industrial control system security engineering." Thesis, De Montfort University, 2017. http://hdl.handle.net/2086/15494.
Der volle Inhalt der QuelleHuang, Qing. "An extension to the Android access control framework." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-73064.
Der volle Inhalt der QuelleOkere, Irene Onyekachi. "A control framework for the assessment of information security culture." Thesis, Nelson Mandela Metropolitan University, 2013. http://hdl.handle.net/10948/d1019861.
Der volle Inhalt der QuelleMarin, Luis Franco. "SELinux policy management framework for HIS." Thesis, Queensland University of Technology, 2008. https://eprints.qut.edu.au/26358/1/Luis_Franco_Thesis.pdf.
Der volle Inhalt der QuelleMarin, Luis Franco. "SELinux policy management framework for HIS." Queensland University of Technology, 2008. http://eprints.qut.edu.au/26358/.
Der volle Inhalt der QuelleRunsewe, Olubisi Atinuke. "A Policy-Based Management Framework for Cloud Computing Security." Thesis, Université d'Ottawa / University of Ottawa, 2014. http://hdl.handle.net/10393/31503.
Der volle Inhalt der QuelleRadhakrishnan, Sakthi Vignesh. "A framework for system fingerprinting." Thesis, Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/47609.
Der volle Inhalt der QuelleKlosinski, Vance J. "Population and resource control measures a conceptual framework for understanding and implementation." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Dec/09Dec%5FKlosinski.pdf.
Der volle Inhalt der QuelleNyeem, Hussain Md Abu. "A digital watermarking framework with application to medical image security." Thesis, Queensland University of Technology, 2014. https://eprints.qut.edu.au/74749/1/Hussain%20Md%20Abu_Nyeem_Thesis.pdf.
Der volle Inhalt der QuelleBücher zum Thema "Security control framework"
Victoria. Office of the Auditor-General. WoVG information security management framework. Victorian Government Printer, 2013.
Den vollen Inhalt der Quelle findenTimothy, Edmunds, and Germann Wilhelm N. 1941-, eds. Towards security sector reform in post Cold War Europe: A framework for assessment. Nomos, 2003.
Den vollen Inhalt der Quelle findenOttawa Verification Symposium (15th 1998 Montebello, Québec). Arms control and the rule of law: A framework for peace and security in outer space : proceedings of the Fifteenth Annual Ottawa NACD Verification Symposium. Centre for International and Security Studies, York University, 1998.
Den vollen Inhalt der Quelle findenMarshall, Beier J., Mataija Steven, and York Centre for International and Strategic Studies., eds. Arms control and the rule of law: A framework for peace and security in outer space : proceedings of the Fifteenth Annual Ottawa NACD Verification Symposium. Centre for International and Security Studies, York University, 1998.
Den vollen Inhalt der Quelle findenNemati, Hamid R. Privacy solutions and security frameworks in information protection. Information Science Reference, 2013.
Den vollen Inhalt der Quelle findenOffice, General Accounting. Defense inventory: Improved management framework needed to guide Army best practice initiatives : report to congressional committees. The Office, 1999.
Den vollen Inhalt der Quelle findenOffice, General Accounting. Defense inventory: Improved management framework needed to guide Navy best practice initiatives : report to congressional committees. The Office, 1999.
Den vollen Inhalt der Quelle findenOffice, General Accounting. Defense inventory: Improved management framework needed to guide Army best practice initiatives : report to Congressional committees. The Office, 1999.
Den vollen Inhalt der Quelle findenOffice, General Accounting. Defense inventory: DOD could improve Total Asset Visibility initiative with Results Act framework : report to Congressional requesters. The Office, 1999.
Den vollen Inhalt der Quelle findenOffice, General Accounting. Defense inventory: Improved management framework needed to guide Air Force best practice initiatives : report to congressional committees. The Office, 1999.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Security control framework"
Tikk-Ringas, Eneken. "Legal Framework of Cyber Security." In Intelligent Systems, Control and Automation: Science and Engineering. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18302-2_8.
Der volle Inhalt der QuelleNabhen, Ricardo, Edgard Jamhour, and Carlos Maziero. "A Policy Based Framework for Access Control." In Information and Communications Security. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-39927-8_5.
Der volle Inhalt der QuelleKayes, A. S. M., Jun Han, and Alan Colman. "ICAF: A Context-Aware Framework for Access Control." In Information Security and Privacy. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31448-3_34.
Der volle Inhalt der QuellePosthumus, Shaun, and Rossouw von Solms. "A Responsibility Framework for Information Security." In Security Management, Integrity, and Internal Control in Information Systems. Springer US, 2005. http://dx.doi.org/10.1007/0-387-31167-x_13.
Der volle Inhalt der QuelleChen, Shiping, Duminda Wijesekera, and Sushil Jajodia. "FlexFlow: A Flexible Flow Control Policy Specification Framework." In Data and Applications Security XVII. Springer US, 2004. http://dx.doi.org/10.1007/1-4020-8070-0_26.
Der volle Inhalt der QuelleMaity, Soumya, and Soumya K. Ghosh. "A Cognitive Trust Model for Access Control Framework in MANET." In Information Systems Security. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35130-3_6.
Der volle Inhalt der QuelleChau, Ngoc-Tu, Minh-Duong Nguyen, Seungwook Jung, and Souhwan Jung. "SecaaS Framework and Architecture: A Design of Dynamic Packet Control." In Information Security Applications. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-15087-1_15.
Der volle Inhalt der QuelleZhu, Quanyan, and Zhiheng Xu. "A Game Framework to Secure Control of CBTC Systems." In Advances in Information Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-60251-2_8.
Der volle Inhalt der QuelleGow, James, and Ivan Zverzžhanovski. "Rules: The Legal and Institutional Framework for Democratic Control." In Security, Democracy and War Crimes. Palgrave Macmillan UK, 2013. http://dx.doi.org/10.1057/9781137276148_5.
Der volle Inhalt der QuelleCrampton, Jason, and Michael Huth. "Towards an Access-Control Framework for Countering Insider Threats." In Insider Threats in Cyber Security. Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-7133-3_8.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Security control framework"
Zhang, Jianhong, and Jie Wei. "On the security of NDN's privacy access control framework." In International Conference on Network Communication and Information Security (ICNCIS 2024), edited by Pascal Lorenz and Ljiljana Trajkovic. SPIE, 2025. https://doi.org/10.1117/12.3051997.
Der volle Inhalt der QuelleSharma, Cheshta, and Tripti Sharma. "Effective Adaptable Framework for Security of IoT Devices." In 2024 International Conference on Communication, Control, and Intelligent Systems (CCIS). IEEE, 2024. https://doi.org/10.1109/ccis63231.2024.10932056.
Der volle Inhalt der QuelleDangwal, Pushkar, Sumit Yadav, and Bharat Bhushan. "Prescriptive Security Framework for Managing risks and Quantifying Security in Software Development Practices." In 2024 International Conference on Communication, Control, and Intelligent Systems (CCIS). IEEE, 2024. https://doi.org/10.1109/ccis63231.2024.10931938.
Der volle Inhalt der QuelleZhang, Yaqin, Peilin Lan, Bo Hu, Shiqi Li, Guimin Meng, and Xinyu Gai. "A New Security Framework Towards 5G Enabled Industrial Control System." In 2023 International Conference on Information Processing and Network Provisioning (ICIPNP). IEEE, 2023. https://doi.org/10.1109/icipnp62754.2023.00049.
Der volle Inhalt der QuelleK, Darshan, Rohan P, and Narendran Sobanapuram Muruganandam. "Machine Learning based Security Enhancement Framework for Software Defined Networks." In 2024 International Conference on Control, Computing, Communication and Materials (ICCCCM). IEEE, 2024. https://doi.org/10.1109/iccccm61016.2024.11039933.
Der volle Inhalt der QuelleChen, Jingzhao, Yu Fan, and Tengfei Li. "QDGM: A Framework of Detection and Performance Evaluation for Industrial CPS Security." In 2024 43rd Chinese Control Conference (CCC). IEEE, 2024. http://dx.doi.org/10.23919/ccc63176.2024.10661768.
Der volle Inhalt der QuelleBerhe, Abraham Belay, Ki-Hyung Kim, and Gebere Akele Tizazu. "Industrial control system security framework for ethiopia." In 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN). IEEE, 2017. http://dx.doi.org/10.1109/icufn.2017.7993912.
Der volle Inhalt der QuelleAftab, Farooq, Shaldon Leparan Suntu, and Zhongshan Zhang. "Self-Organized Security Framework for WiGig WLAN against Attacks and Threats." In 2018 13th APCA International Conference on Automatic Control and Soft Computing (CONTROLO). IEEE, 2018. http://dx.doi.org/10.1109/controlo.2018.8439750.
Der volle Inhalt der QuelleMarina, Ninoslav, Aneta Velkoska, Natasha Paunkoska, and Ljupcho Baleski. "Security in Twin-code framework." In 2015 7th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT). IEEE, 2015. http://dx.doi.org/10.1109/icumt.2015.7382437.
Der volle Inhalt der QuelleM, Tony Aby Varkey, Mir Adil, and Swati Singh. "loT Security Enhancement: A Cybersecurity Framework." In 2023 International Conference on Power Energy, Environment & Intelligent Control (PEEIC). IEEE, 2023. http://dx.doi.org/10.1109/peeic59336.2023.10450442.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Security control framework"
Wayne F. Boyer and Miles A. McQueen. Primer Control System Cyber Security Framework and Technical Metrics. Office of Scientific and Technical Information (OSTI), 2008. http://dx.doi.org/10.2172/935471.
Der volle Inhalt der QuelleRobert P. Evans. Control Systems Security Center Comparison Study of Industrial Control System Standards against the Control Systems Protection Framework Cyber-Security Requirements. Office of Scientific and Technical Information (OSTI), 2005. http://dx.doi.org/10.2172/911771.
Der volle Inhalt der QuelleBasbugoglu, Tarik, Roland Fazekas, and Marcus Nicolson. Security Forces Radicalisation Report. Glasgow Caledonian University, 2025. https://doi.org/10.59019/xqhnf105.
Der volle Inhalt der QuelleLong, Michael, Daniel Bush, Stephen Briggs, et al. An Army guide to navigating the cyber security process for Facility Related Control Systems : cybersecurity and risk management framework explanations for the real world. Engineer Research and Development Center (U.S.), 2020. http://dx.doi.org/10.21079/11681/35294.
Der volle Inhalt der QuelleMeijer, Karen, and Ann-Sophie Böhle. Climate change adaptation in areas beyond government control: Opportunities and limitations. Stockholm International Peace Research Institute, 2024. http://dx.doi.org/10.55163/rqks8098.
Der volle Inhalt der QuelleErästö, Tytti. Clearing the Path for Nuclear Disarmament: Confidence-building in the Korean Peninsula. Stockholm International Peace Research Institute, 2025. https://doi.org/10.55163/oydm2762.
Der volle Inhalt der QuelleBurniske, Jessica, Dustin Lewis, and Naz Modirzadeh. Suppressing Foreign Terrorist Fighters and Supporting Principled Humanitarian Action: A Provisional Framework for Analyzing State Practice. Harvard Law School Program on International Law and Armed Conflict, 2015. http://dx.doi.org/10.54813/nrmd2833.
Der volle Inhalt der QuelleLewis, Dustin, Radhika Kapoor, and Naz Modirzadeh. Advancing Humanitarian Commitments in Connection with Countering Terrorism: Exploring a Foundational Reframing concerning the Security Council. Harvard Law School Program on International Law and Armed Conflict, 2021. http://dx.doi.org/10.54813/uzav2714.
Der volle Inhalt der QuelleBajon, Theò. Weapons and Ammunition Management Country Insight: Republic of Côte d’Ivoire. UNIDIR, 2025. https://doi.org/10.37559/caap/25/wam/06.
Der volle Inhalt der QuelleRagozin, Konstantin. High-tech ecosystem in construction. Intellectual Archive, 2024. http://dx.doi.org/10.32370/iaj.3187.
Der volle Inhalt der Quelle