Auswahl der wissenschaftlichen Literatur zum Thema „Security control framework“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Security control framework" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "Security control framework"

1

Kumar, Harsh. "Cloud Compliance Security Optimization." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem49485.

Der volle Inhalt der Quelle
Annotation:
Abstract— Managing compliance with diverse regulatory standards in cloud environments poses considerable operational challenges for modern enterprises. Manual processes, duplicated efforts, and lack of traceability often complicate the audit lifecycle, especially when multiple frameworks like PCI DSS, ISO 27001, SOC 1, SOC 2, and C5 are involved. This paper introduces a scalable compliance optimization framework developed and deployed within Enterprise internal audit ecosystem to streamline audit readiness and control management. The framework integrates tools such as Compliance manager, Signa
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Wang, Yu Fei, Tao Zhang, Yuan Yuan Ma, and Bo Zhang. "An Information Security Assessments Framework for Power Control Systems." Advanced Materials Research 805-806 (September 2013): 980–84. http://dx.doi.org/10.4028/www.scientific.net/amr.805-806.980.

Der volle Inhalt der Quelle
Annotation:
Information and cyber security of Industrial Control Systems (ICS) faces severe challenges and has gained considerable importance. Information security assessment is an essential component of information security assurance infrastructure mechanisms. First, a hierarchical model of smart grid was abstracted. Based on the proposed model and the information security risks and information security protection demands of power control systems, an information security assessments framework for power control systems was proposed in dimensions of system layers and life cycle to guide the security assess
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Al Ketbi, Maitha, Khaled Shuaib, Ezedin Barka, and Marton Gergely. "Establishing a Security Control Framework for Blockchain Technology." Interdisciplinary Journal of Information, Knowledge, and Management 16 (2021): 307–30. http://dx.doi.org/10.28945/4837.

Der volle Inhalt der Quelle
Annotation:
Aim/Purpose: The aim of this paper is to propose a new information security controls framework for blockchain technology, which is currently absent from the National and International Information Security Standards. Background: Blockchain technology is a secure and relatively new technology of distributed digital ledgers, which is based on inter-linked blocks of transactions, providing great benefits such as decentralization, transparency, immutability, and automation. There is a rapid growth in the adoption of blockchain technology in different solutions and applications and within different
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Abdulrahman, H. Altalhi1 Zailani Mohamed Sidek2 Norjihan Abdul Ghani3 Fazidah Othman4 and Maged Abdelkhaleq Al-Sheshtawil5. "ENHANCING THE SECURITY FRAMEWORK SECURECLOUD WITH THE SWIFT IDENTITY MANAGEMENT FRAMEWORK." International Journal on Cloud Computing: Services and Architecture(IJCCSA) 2, February (2018): 01–07. https://doi.org/10.5281/zenodo.1444289.

Der volle Inhalt der Quelle
Annotation:
SecureCloud is a comprehensive security framework for cloud computing environments consisting of different modules that handle the security and trust issues of key components. One of the modules is responsible for authentication and identity management (IDM). In SecureCloud, the author suggest, to implement the security solution for the Authentication and IDM module, it is important to ensure IDM services in the cloud can be integrated with the existing IDM framework. Existing techniques for use of pseudonyms and accommodating multiple identities to protect users’ privacy can help build
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Ji, Kaining, Yitian Liu, and Changju Hu. "Design of Security Control Framework for Power System Microservices." Advances in Engineering Technology Research 13, no. 1 (2025): 777. https://doi.org/10.56028/aetr.13.1.777.2025.

Der volle Inhalt der Quelle
Annotation:
With the development of power system, the data complexity and function hybridity of business system are getting higher, which brings new challenges to the traditional microservices security system of business system. In order to meet the large-scale API interface authorization requirements of the business system, improve the sensitivity of the security system to abnormal traffic, and enhance the system's ability to determine the source of the exception and trace the audit, this paper proposes a microservices security control framework to deal with complex business systems. Using Netty as the u
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Kumar, Anurag, and Prof Bibha Kumari. "Implementing Privacy Preserving Techniques in Distributed Big Data Framework on Cloud Computing." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 008 (2024): 1–14. http://dx.doi.org/10.55041/ijsrem37051.

Der volle Inhalt der Quelle
Annotation:
Cloud-based deployment architectures have emerged as the preferred model for Big Data operations due to their scalability, flexibility, and cost-effectiveness. However, this shift raises new security concerns as data is no longer directly under the user's control. Securing Big Data in cloud environments is crucial for widespread adoption, but developing a comprehensive security plan is challenging without a thorough analysis of potential vulnerabilities.To address this, a novel security-by-design framework for Big Data deployment on cloud computing, termed Big Cloud, is proposed in this articl
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Yogesh Kumar Bhardwaj. "Securing Generative AI: Navigating Data Security Challenges in the AI Era." Journal of Computer Science and Technology Studies 7, no. 4 (2025): 147–55. https://doi.org/10.32996/jcsts.2025.7.4.17.

Der volle Inhalt der Quelle
Annotation:
This article examines the evolving security landscape for Generative Artificial Intelligence (GenAI) systems as they become increasingly integrated across critical sectors including healthcare, finance, and transportation. The proliferation of these technologies creates both transformative opportunities and significant security challenges that require specialized approaches. It explores key security vulnerabilities unique to GenAI implementations, including data protection vulnerabilities, access control complexities, data anonymization gaps, model integrity risks, monitoring challenges, intel
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Alshammari, Ahmad. "A Novel Security Framework to Mitigate and Avoid Unexpected Security Threats in Saudi Arabia." Engineering, Technology & Applied Science Research 13, no. 4 (2023): 11445–50. http://dx.doi.org/10.48084/etasr.6091.

Der volle Inhalt der Quelle
Annotation:
Many organizations around the world suffer large losses due to unexpected risks which can have a profound impact on their survival. This paper presents a novel security framework to address the security needs of Saudi organizations. There are four stages in the security framework: risk assessment and management, security intelligence and analytics, security policies and procedures, and security monitoring. A comprehensive security solution was provided by combining common security frameworks, e.g. ISO/IEC 27001:2013, NIST Cybersecurity Framework, and COBIT. The developed framework was designed
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Xu, Mudi, Benfeng Chen, Zhizhong Tan, et al. "AHAC: Advanced Network-Hiding Access Control Framework." Applied Sciences 14, no. 13 (2024): 5593. http://dx.doi.org/10.3390/app14135593.

Der volle Inhalt der Quelle
Annotation:
In the current context of rapid Internet of Things (IoT) and cloud computing technology development, the Single Packet Authorization (SPA) protocol faces increasing challenges, such as security threats from Distributed Denial of Service (DDoS) attacks. To address these issues, we propose the Advanced Network-Hiding Access Control (AHAC) framework, designed to enhance security by reducing network environment exposure and providing secure access methods. AHAC introduces an independent control surface as the access proxy service and combines it with a noise generation mechanism for encrypted acce
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Kalwani, Seema. "Quality Framework, Principles, control practices, benchmark, internal controls addressing needs of current world." International Journal of Multidisciplinary Research and Growth Evaluation 2, no. 4 (2021): 919–26. https://doi.org/10.54660/.ijmrge.2021.2.4.919-926.

Der volle Inhalt der Quelle
Annotation:
The article provides overview of Quality Assurance and Improvement Program. Describing quality 4.0 principles, tools, value propositions, quality management, planning, metrics and measurement used as benchmark to keep a check and continuously improve quality of work, products, processes. Internal control and security used by management, IT security, financial, accounting, and operational teams to meet their goals are discussed.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Mehr Quellen

Dissertationen zum Thema "Security control framework"

1

Viljoen, Melanie. "A framework towards effective control in information security governance." Thesis, Nelson Mandela Metropolitan University, 2009. http://hdl.handle.net/10948/887.

Der volle Inhalt der Quelle
Annotation:
The importance of information in business today has made the need to properly secure this asset evident. Information security has become a responsibility for all managers of an organization. To better support more efficient management of information security, timely information security management information should be made available to all managers. Smaller organizations face special challenges with regard to information security management and reporting due to limited resources (Ross, 2008). This dissertation discusses a Framework for Information Security Management Information (FISMI) that
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Benjuma, Nuria Mahmud. "An educational framework to support industrial control system security engineering." Thesis, De Montfort University, 2017. http://hdl.handle.net/2086/15494.

Der volle Inhalt der Quelle
Annotation:
Industrial Control Systems (ICSs) are used to monitor and control critical infrastructure such as electricity and water. ICS were originally stand-alone systems, but are now widely being connected to corporate national IT networks, making remote monitoring and more timely control possible. While this connectivity has brought multiple benefits to ICS, such as cost reductions and an increase in redundancy and flexibility, ICS were not designed for open connectivity and therefore are more prone to security threats, creating a greater requirement for adequate security engineering approaches. The c
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Huang, Qing. "An extension to the Android access control framework." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-73064.

Der volle Inhalt der Quelle
Annotation:
Several nice hardware functionalities located at the low level of operating system onmobile phones could be utilized in a better way if they are available to applicationdevelopers. With their help, developers are able to bring overall user experienceto a new level in terms of developing novel applications. For instance, one of thosehardware functionalities, SIM-card authentication is able to offer stronger andmore convenient way of authentication when compared to the traditional approach.Replacing the username-password combination with the SIM-card authentication,users are freed from memorizin
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Okere, Irene Onyekachi. "A control framework for the assessment of information security culture." Thesis, Nelson Mandela Metropolitan University, 2013. http://hdl.handle.net/10948/d1019861.

Der volle Inhalt der Quelle
Annotation:
The modern organisation relies heavily on information to function effectively. With such reliance on information, it is vital that information be protected from both internal (employees) and external threats. The protection of information or information security to a large extent depends on the behaviour of humans (employees) in the organisation. The behaviour of employees is one of the top information security issues facing organisations as the human factor is regarded as the weakest link in the security chain. To address this human factor many researchers have suggested the fostering of a cu
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Marin, Luis Franco. "SELinux policy management framework for HIS." Thesis, Queensland University of Technology, 2008. https://eprints.qut.edu.au/26358/1/Luis_Franco_Thesis.pdf.

Der volle Inhalt der Quelle
Annotation:
Health Information Systems (HIS) make extensive use of Information and Communication Technologies (ICT). The use of ICT aids in improving the quality and efficiency of healthcare services by making healthcare information available at the point of care (Goldstein, Groen, Ponkshe, and Wine, 2007). The increasing availability of healthcare data presents security and privacy issues which have not yet been fully addressed (Liu, Caelli, May, and Croll, 2008a). Healthcare organisations have to comply with the security and privacy requirements stated in laws, regulations and ethical standards, while m
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Marin, Luis Franco. "SELinux policy management framework for HIS." Queensland University of Technology, 2008. http://eprints.qut.edu.au/26358/.

Der volle Inhalt der Quelle
Annotation:
Health Information Systems (HIS) make extensive use of Information and Communication Technologies (ICT). The use of ICT aids in improving the quality and efficiency of healthcare services by making healthcare information available at the point of care (Goldstein, Groen, Ponkshe, and Wine, 2007). The increasing availability of healthcare data presents security and privacy issues which have not yet been fully addressed (Liu, Caelli, May, and Croll, 2008a). Healthcare organisations have to comply with the security and privacy requirements stated in laws, regulations and ethical standards, while m
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Runsewe, Olubisi Atinuke. "A Policy-Based Management Framework for Cloud Computing Security." Thesis, Université d'Ottawa / University of Ottawa, 2014. http://hdl.handle.net/10393/31503.

Der volle Inhalt der Quelle
Annotation:
Cloud Computing has changed how computing is done as applications and services are being consumed from the cloud. It has attracted a lot of attention in recent times due to the opportunities it offers. While Cloud Computing is economical, the security challenges it poses are quite significant and this has affected the adoption rate of the technology. With the potential vulnerabilities being introduced by moving data to the cloud, it has become imperative for cloud service providers to guarantee the security of information, leaving cloud service consumers (e.g., enterprises) with the task of ne
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Radhakrishnan, Sakthi Vignesh. "A framework for system fingerprinting." Thesis, Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/47609.

Der volle Inhalt der Quelle
Annotation:
The primary objective of the proposed research is to develop a framework for smart and robust fingerprinting of networked systems. Many fingerprinting techniques have been proposed in the past, however most of these techniques are designed for a specific purpose, such as Operating System (OS) fingerprinting, Access Point (AP) fingerprinting, etc. Such standalone techniques often have limitations which render them dysfunctional in certain scenarios or against certain counter measures. In order to overcome such limitations, we propose a fingerprinting framework that can combine multiple fingerpr
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Klosinski, Vance J. "Population and resource control measures a conceptual framework for understanding and implementation." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Dec/09Dec%5FKlosinski.pdf.

Der volle Inhalt der Quelle
Annotation:
Thesis (M.S. in Defense Analysis)--Naval Postgraduate School, December 2009.<br>Thesis Advisor(s): Simmons, Anna. Second Reader: Lee, Doowan. "December 2009." Description based on title screen as viewed on January 27, 2010. Author(s) subject terms: Population and resource control measures, Population control, Counterinsurgency, COIN, Populationcentric COIN, Social control, Social movement theory. Includes bibliographical references (p. 51-53). Also available in print.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Nyeem, Hussain Md Abu. "A digital watermarking framework with application to medical image security." Thesis, Queensland University of Technology, 2014. https://eprints.qut.edu.au/74749/1/Hussain%20Md%20Abu_Nyeem_Thesis.pdf.

Der volle Inhalt der Quelle
Annotation:
Dealing with digital medical images is raising many new security problems with legal and ethical complexities for local archiving and distant medical services. These include image retention and fraud, distrust and invasion of privacy. This project was a significant step forward in developing a complete framework for systematically designing, analyzing, and applying digital watermarking, with a particular focus on medical image security. A formal generic watermarking model, three new attack models, and an efficient watermarking technique for medical images were developed. These outcomes contrib
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Mehr Quellen

Bücher zum Thema "Security control framework"

1

Victoria. Office of the Auditor-General. WoVG information security management framework. Victorian Government Printer, 2013.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Timothy, Edmunds, and Germann Wilhelm N. 1941-, eds. Towards security sector reform in post Cold War Europe: A framework for assessment. Nomos, 2003.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Ottawa Verification Symposium (15th 1998 Montebello, Québec). Arms control and the rule of law: A framework for peace and security in outer space : proceedings of the Fifteenth Annual Ottawa NACD Verification Symposium. Centre for International and Security Studies, York University, 1998.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Marshall, Beier J., Mataija Steven, and York Centre for International and Strategic Studies., eds. Arms control and the rule of law: A framework for peace and security in outer space : proceedings of the Fifteenth Annual Ottawa NACD Verification Symposium. Centre for International and Security Studies, York University, 1998.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Nemati, Hamid R. Privacy solutions and security frameworks in information protection. Information Science Reference, 2013.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Office, General Accounting. Defense inventory: Improved management framework needed to guide Army best practice initiatives : report to congressional committees. The Office, 1999.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Office, General Accounting. Defense inventory: Improved management framework needed to guide Navy best practice initiatives : report to congressional committees. The Office, 1999.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Office, General Accounting. Defense inventory: Improved management framework needed to guide Army best practice initiatives : report to Congressional committees. The Office, 1999.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Office, General Accounting. Defense inventory: DOD could improve Total Asset Visibility initiative with Results Act framework : report to Congressional requesters. The Office, 1999.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Office, General Accounting. Defense inventory: Improved management framework needed to guide Air Force best practice initiatives : report to congressional committees. The Office, 1999.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Mehr Quellen

Buchteile zum Thema "Security control framework"

1

Tikk-Ringas, Eneken. "Legal Framework of Cyber Security." In Intelligent Systems, Control and Automation: Science and Engineering. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18302-2_8.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Nabhen, Ricardo, Edgard Jamhour, and Carlos Maziero. "A Policy Based Framework for Access Control." In Information and Communications Security. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-39927-8_5.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Kayes, A. S. M., Jun Han, and Alan Colman. "ICAF: A Context-Aware Framework for Access Control." In Information Security and Privacy. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31448-3_34.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Posthumus, Shaun, and Rossouw von Solms. "A Responsibility Framework for Information Security." In Security Management, Integrity, and Internal Control in Information Systems. Springer US, 2005. http://dx.doi.org/10.1007/0-387-31167-x_13.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Chen, Shiping, Duminda Wijesekera, and Sushil Jajodia. "FlexFlow: A Flexible Flow Control Policy Specification Framework." In Data and Applications Security XVII. Springer US, 2004. http://dx.doi.org/10.1007/1-4020-8070-0_26.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Maity, Soumya, and Soumya K. Ghosh. "A Cognitive Trust Model for Access Control Framework in MANET." In Information Systems Security. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35130-3_6.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Chau, Ngoc-Tu, Minh-Duong Nguyen, Seungwook Jung, and Souhwan Jung. "SecaaS Framework and Architecture: A Design of Dynamic Packet Control." In Information Security Applications. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-15087-1_15.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Zhu, Quanyan, and Zhiheng Xu. "A Game Framework to Secure Control of CBTC Systems." In Advances in Information Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-60251-2_8.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Gow, James, and Ivan Zverzžhanovski. "Rules: The Legal and Institutional Framework for Democratic Control." In Security, Democracy and War Crimes. Palgrave Macmillan UK, 2013. http://dx.doi.org/10.1057/9781137276148_5.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Crampton, Jason, and Michael Huth. "Towards an Access-Control Framework for Countering Insider Threats." In Insider Threats in Cyber Security. Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-7133-3_8.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "Security control framework"

1

Zhang, Jianhong, and Jie Wei. "On the security of NDN's privacy access control framework." In International Conference on Network Communication and Information Security (ICNCIS 2024), edited by Pascal Lorenz and Ljiljana Trajkovic. SPIE, 2025. https://doi.org/10.1117/12.3051997.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Sharma, Cheshta, and Tripti Sharma. "Effective Adaptable Framework for Security of IoT Devices." In 2024 International Conference on Communication, Control, and Intelligent Systems (CCIS). IEEE, 2024. https://doi.org/10.1109/ccis63231.2024.10932056.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Dangwal, Pushkar, Sumit Yadav, and Bharat Bhushan. "Prescriptive Security Framework for Managing risks and Quantifying Security in Software Development Practices." In 2024 International Conference on Communication, Control, and Intelligent Systems (CCIS). IEEE, 2024. https://doi.org/10.1109/ccis63231.2024.10931938.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Zhang, Yaqin, Peilin Lan, Bo Hu, Shiqi Li, Guimin Meng, and Xinyu Gai. "A New Security Framework Towards 5G Enabled Industrial Control System." In 2023 International Conference on Information Processing and Network Provisioning (ICIPNP). IEEE, 2023. https://doi.org/10.1109/icipnp62754.2023.00049.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

K, Darshan, Rohan P, and Narendran Sobanapuram Muruganandam. "Machine Learning based Security Enhancement Framework for Software Defined Networks." In 2024 International Conference on Control, Computing, Communication and Materials (ICCCCM). IEEE, 2024. https://doi.org/10.1109/iccccm61016.2024.11039933.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Chen, Jingzhao, Yu Fan, and Tengfei Li. "QDGM: A Framework of Detection and Performance Evaluation for Industrial CPS Security." In 2024 43rd Chinese Control Conference (CCC). IEEE, 2024. http://dx.doi.org/10.23919/ccc63176.2024.10661768.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Berhe, Abraham Belay, Ki-Hyung Kim, and Gebere Akele Tizazu. "Industrial control system security framework for ethiopia." In 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN). IEEE, 2017. http://dx.doi.org/10.1109/icufn.2017.7993912.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Aftab, Farooq, Shaldon Leparan Suntu, and Zhongshan Zhang. "Self-Organized Security Framework for WiGig WLAN against Attacks and Threats." In 2018 13th APCA International Conference on Automatic Control and Soft Computing (CONTROLO). IEEE, 2018. http://dx.doi.org/10.1109/controlo.2018.8439750.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Marina, Ninoslav, Aneta Velkoska, Natasha Paunkoska, and Ljupcho Baleski. "Security in Twin-code framework." In 2015 7th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT). IEEE, 2015. http://dx.doi.org/10.1109/icumt.2015.7382437.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

M, Tony Aby Varkey, Mir Adil, and Swati Singh. "loT Security Enhancement: A Cybersecurity Framework." In 2023 International Conference on Power Energy, Environment & Intelligent Control (PEEIC). IEEE, 2023. http://dx.doi.org/10.1109/peeic59336.2023.10450442.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Berichte der Organisationen zum Thema "Security control framework"

1

Wayne F. Boyer and Miles A. McQueen. Primer Control System Cyber Security Framework and Technical Metrics. Office of Scientific and Technical Information (OSTI), 2008. http://dx.doi.org/10.2172/935471.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Robert P. Evans. Control Systems Security Center Comparison Study of Industrial Control System Standards against the Control Systems Protection Framework Cyber-Security Requirements. Office of Scientific and Technical Information (OSTI), 2005. http://dx.doi.org/10.2172/911771.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Basbugoglu, Tarik, Roland Fazekas, and Marcus Nicolson. Security Forces Radicalisation Report. Glasgow Caledonian University, 2025. https://doi.org/10.59019/xqhnf105.

Der volle Inhalt der Quelle
Annotation:
The structure of this report begins with the introduction. The second section introduces the concept of Democratic Control of Armed Forces. The third section examines the theoretical framework and methodology. The fourth part explains how political elites tackle radicalization within the armed forces (training programs etc.). The fifth underscores how political elites perceived threat of radicalization in each country. The fifth underlines the constitutional background of armed forces and judicial implications that seek to prevent the radicalization and extremism within the military. The sixth
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Long, Michael, Daniel Bush, Stephen Briggs, et al. An Army guide to navigating the cyber security process for Facility Related Control Systems : cybersecurity and risk management framework explanations for the real world. Engineer Research and Development Center (U.S.), 2020. http://dx.doi.org/10.21079/11681/35294.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Meijer, Karen, and Ann-Sophie Böhle. Climate change adaptation in areas beyond government control: Opportunities and limitations. Stockholm International Peace Research Institute, 2024. http://dx.doi.org/10.55163/rqks8098.

Der volle Inhalt der Quelle
Annotation:
Areas beyond government control constitute a highly diverse subgroup of fragile and conflict-affected settings. As a result of conflict and weak governance, many of these areas have become more vulnerable to climate change, and their communities have been left with limited capacity to respond to changing climatic conditions and extreme weather events. These settings pose unique challenges for external engagement and have, therefore, long been overlooked in adaptation efforts. This SIPRI Insights on Peace and Security explores both opportunities for and limitations of climate change adaptation
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Erästö, Tytti. Clearing the Path for Nuclear Disarmament: Confidence-building in the Korean Peninsula. Stockholm International Peace Research Institute, 2025. https://doi.org/10.55163/oydm2762.

Der volle Inhalt der Quelle
Annotation:
This paper explores possibilities for building confidence in the Korean peninsula to address the conflict dynamics and militarization in the region. It argues that a key reason for the failure of past diplomatic efforts has been the coercive approach in pursuit of immediate nuclear disarmament in North Korea. In addition to a more incremental approach to North Korean–United States nuclear diplomacy focused on arms control, the paper highlights the need for reciprocity in terms of sanctions relief, as well as more robust confidence-building measures aimed at reducing instability and addressing
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Burniske, Jessica, Dustin Lewis, and Naz Modirzadeh. Suppressing Foreign Terrorist Fighters and Supporting Principled Humanitarian Action: A Provisional Framework for Analyzing State Practice. Harvard Law School Program on International Law and Armed Conflict, 2015. http://dx.doi.org/10.54813/nrmd2833.

Der volle Inhalt der Quelle
Annotation:
In 2014, reports suggested that a surge of foreign jihadists were participating in armed conflicts in Syria, Iraq, and elsewhere. The United Nations Security Council responded by imposing in Resolution 2178 (2014) an array of obligations on member states to counter the threat posed by “foreign terrorist fighters” (FTFs). In the intervening year, those states have taken a range of actions — though at various speeds and with varying levels of commitment — to implement the FTF obligations imposed by the Council. Meanwhile, many states continue to fund and otherwise throw their support behind life
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Lewis, Dustin, Radhika Kapoor, and Naz Modirzadeh. Advancing Humanitarian Commitments in Connection with Countering Terrorism: Exploring a Foundational Reframing concerning the Security Council. Harvard Law School Program on International Law and Armed Conflict, 2021. http://dx.doi.org/10.54813/uzav2714.

Der volle Inhalt der Quelle
Annotation:
The imperative to provide humanitarian and medical services on an urgent basis in armed conflicts is anchored in moral tenets, shared values, and international rules. States spend tens of billions of dollars each year to help implement humanitarian programs in conflicts across the world. Yet, in practice, counterterrorism objectives increasingly prevail over humanitarian concerns, often resulting in devastating effects for civilian populations in need of aid and protection in war. Not least, confusion and misapprehensions about the power and authority of States relative to the United Nations S
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Bajon, Theò. Weapons and Ammunition Management Country Insight: Republic of Côte d’Ivoire. UNIDIR, 2025. https://doi.org/10.37559/caap/25/wam/06.

Der volle Inhalt der Quelle
Annotation:
UNIDIR defines weapons and ammunition management (WAM) in a comprehensive manner covering the oversight, accountability and governance of conventional arms and ammunition throughout their management cycle. This includes the establishment of relevant national frameworks, processes and practices for the safe and secure production and acquisition of materiel, stockpiling, transfers, end use control, tracing and disposal. This holistic approach is essential in ensuring that efforts to better regulate arms and ammunition are undertaken in alignment with relevant humanitarian, peacebuilding, securit
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Ragozin, Konstantin. High-tech ecosystem in construction. Intellectual Archive, 2024. http://dx.doi.org/10.32370/iaj.3187.

Der volle Inhalt der Quelle
Annotation:
The issues of ensuring the stability and safety of energy generating equipment, including through various innovative aspects of cyber security, are currently extremely relevant; Energy equipment when used within the framework of construction projects is quite autonomous and issues of operational management and online control can be fully resolved within the capacity of their internal processors and controllers. In many cases, issues of computer modeling of the operating cycle parameters of such equipment, with the correct and economical formulation of the problem, can also be solved using the
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!