Academic literature on the topic 'Data transmission systems Security measures'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Data transmission systems Security measures.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Data transmission systems Security measures"
Li, Feng, and Hai Ying Wang. "Designed on Information Security Systems for Mobile Databases." Advanced Materials Research 915-916 (April 2014): 1424–27. http://dx.doi.org/10.4028/www.scientific.net/amr.915-916.1424.
Full textShen, Yang. "Research on Internet Information Security in the Big Data Era." E3S Web of Conferences 218 (2020): 04008. http://dx.doi.org/10.1051/e3sconf/202021804008.
Full textKhan, Muhammad Amir, Jawad Khan, Nabila Sehito, Khalid Mahmood, Haider Ali, Inam Bari, Muhammad Arif, and Raania M. Ghoniem. "An Adaptive Enhanced Technique for Locked Target Detection and Data Transmission over Internet of Healthcare Things." Electronics 11, no. 17 (August 30, 2022): 2726. http://dx.doi.org/10.3390/electronics11172726.
Full textMallikarjuna Shastry P.M, Prasanthi Konduru,. "Huffman Coding and Multi-Generation Mixing Assisted Network Coding Based MAC for QoS-Centric Secure Data Communication over MANETs." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (April 5, 2021): 2146–66. http://dx.doi.org/10.17762/turcomat.v12i6.4820.
Full textStorm van Leeuwen, Daan, Ali Ahmed, Craig Watterson, and Nilufar Baghaei. "Contact Tracing: Ensuring Privacy and Security." Applied Sciences 11, no. 21 (October 25, 2021): 9977. http://dx.doi.org/10.3390/app11219977.
Full textSokolovsky, S. P. "PARAMETRIC OPTIMIZATION OF INFORMATION SYSTEMS FOR PROACTIVE PROTECTION OF DATA TRANSMISSION SERVICE FROM NETWORK RECONNAISSANCE." Vestnik komp'iuternykh i informatsionnykh tekhnologii, no. 215 (May 2022): 49–57. http://dx.doi.org/10.14489/vkit.2022.05.pp.049-057.
Full textPathak, Gaurav, Jairo Gutierrez, and Saeed Ur Rehman. "Security in Low Powered Wide Area Networks: Opportunities for Software Defined Network-Supported Solutions." Electronics 9, no. 8 (July 25, 2020): 1195. http://dx.doi.org/10.3390/electronics9081195.
Full textBagul, Riya, Atharva Karaguppi, Vishwas Karale, Mudit Singal, and Dr Vaishali Ingale. "A Dynamic and Highly Configurable Crypto-Processor for brief communication interval." Journal of University of Shanghai for Science and Technology 23, no. 05 (May 25, 2021): 551–61. http://dx.doi.org/10.51201/jusst/21/05162.
Full textMartin Boros, Matej Kucera, Andrej Velas, and Jan Valouch. "Possibilities for Experimental Testing of Alarm Transmission Systems." Communications - Scientific letters of the University of Zilina 22, no. 2 (April 1, 2020): 123–28. http://dx.doi.org/10.26552/com.c.2020.2.123-128.
Full textKumari, Kimmi, and M. Mrunalini. "IoT Big Data Security, Privacy and Challenges Related to Smart Grid." International Journal of Wireless Networks and Broadband Technologies 8, no. 2 (July 2019): 1–10. http://dx.doi.org/10.4018/ijwnbt.2019070101.
Full textDissertations / Theses on the topic "Data transmission systems Security measures"
Tandon, Prateek. "High-performance advanced encryption standard (AES) security co-processor design." Thesis, Available online, Georgia Institute of Technology, 2004:, 2003. http://etd.gatech.edu/theses/available/etd-04082004-180433/unrestricted/tandon%5fprateek%5f200312%5fms.pdf.
Full textBeckman, Joseph M. "Legal requirements of secure systems." Thesis, Kansas State University, 1985. http://hdl.handle.net/2097/9822.
Full textFernandez, Irma Becerra. "Encryption-based security for public networks : technique and application." FIU Digital Commons, 1994. http://digitalcommons.fiu.edu/etd/3296.
Full textMayisela, Simphiwe Hector. "Data-centric security : towards a utopian model for protecting corporate data on mobile devices." Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1011094.
Full textAlkhaldi, Rawan. "Spatial data transmission security authentication of spatial data using a new temporal taxonomy /." abstract and full text PDF (free order & download UNR users only), 2005. http://0-gateway.proquest.com.innopac.library.unr.edu/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:1433280.
Full textLee, Yung-Chuan. "A multi-stage framework on data transmission security for asymmetric systems /." Available to subscribers only, 2005. http://proquest.umi.com/pqdweb?did=1221743771&sid=21&Fmt=2&clientId=1509&RQT=309&VName=PQD.
Full textCoertze, Jacques Jacobus. "A framework for information security governance in SMMEs." Thesis, Nelson Mandela Metropolitan University, 2012. http://hdl.handle.net/10948/d1014083.
Full textZhang, Cong, and 張聰. "Design of Anonymity scheme for communication systems." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2002. http://hub.hku.hk/bib/B31228100.
Full textMa, Chunyan. "Mathematical security models for multi-agent distributed systems." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2568.
Full textFragkos, Grigorios. "Near real-time threat assessment using intrusion detection system's data." Thesis, University of South Wales, 2011. https://pure.southwales.ac.uk/en/studentthesis/near-realtime-threat-assessment-using-intrusion-detection-systems-data(96a9528f-f319-4125-aaf0-71593bb61b56).html.
Full textBooks on the topic "Data transmission systems Security measures"
Rao, Yarlagadda R. K., ed. Data transportation and protection. New York: Plenum Press, 1986.
Find full textDavies, Donald Watts. Security for computer networks: An introduction to data security in teleprocessing and electronic funds transfer. 2nd ed. Chichester [England]: Wiley, 1989.
Find full textL, Price W., ed. Security for computer networks: An introduction to data security in teleprocessing and electronic funds transfer. 2nd ed. Chichester: Wiley, 1989.
Find full textSymposium Electromagnetic Security for Information Protection (1991 Rome, Italy). Proceedings. Rome: Fondazione Ugo Bordoni, 1992.
Find full textComputer & Communications Security '86 (1986 New York, N.Y.). Conference proceedings. Des Plaines, IL: Cahners Exposition Group, 1986.
Find full textACM Conference on Computer and Communications Security (6th 1999 Singapore). 6th ACM Conference on Computer and Communications Security: November 2-4,1999, Kent Ridge Digital Labs. New York: Association for Computing Machinery, 1999.
Find full textStandardization, International Organization for. Information processing systems: Open systems interconnection, basic reference model. [Geneva, Switzerland?]: The Organzation, 1988.
Find full textStandardization, International Organization for. Information processing systems: Open systems interconnection, basic reference model. [Geneva, Switzerland?]: The Organization, 1989.
Find full textStandardization, International Organization for. Information processing systems: Open systems interconnection, basic reference model. [Geneva, Switzerland?]: The Organization, 1989.
Find full textBook chapters on the topic "Data transmission systems Security measures"
Wang, Haijun, Yanan Zhang, and Chao Ma. "Data Security Management Implementation Measures for Intelligent Connected Vehicles (ICVs)." In Advances in Intelligent Systems and Computing, 594–600. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-63089-8_38.
Full textTopór-Kamiński, Tadeusz, Beata Krupanek, and Jarosław Homa. "Delays Models of Measurement and Control Data Transmission Network." In Advanced Technologies for Intelligent Systems of National Border Security, 257–79. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-31665-4_21.
Full textWang, Bin, Long Guo, and Peng Xu. "Computer Network Security and Preventive Measures Based on Big Data Technology." In Advances in Intelligent Systems and Computing, 656–63. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-4572-0_94.
Full textFakude, Nhlakanipho C., Ayoturi T. Akinola, and Mathew O. Adigun. "The Effect of Data Transmission and Storage Security Between Device–Cloudlet Communication." In Advances in Intelligent Systems and Computing, 307–19. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-32-9343-4_24.
Full textHolzinger, Andreas, Bernhard Ofner, Christof Stocker, André Calero Valdez, Anne Kathrin Schaar, Martina Ziefle, and Matthias Dehmer. "On Graph Entropy Measures for Knowledge Discovery from Publication Network Data." In Availability, Reliability, and Security in Information Systems and HCI, 354–62. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40511-2_25.
Full textDule, Chhaya S., and H. A. Girijamma. "Guaging the Effectivity of Existing Security Measures for Big Data in Cloud Environment." In Advances in Intelligent Systems and Computing, 209–19. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-57141-6_22.
Full textKim, Jinsub, and Lang Tong. "Against Data Attacks on Smart Grid Operations: Attack Mechanisms and Security Measures." In Cyber Physical Systems Approach to Smart Electric Power Grid, 359–83. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-45928-7_13.
Full textXia, Ping. "Data Security Risk and Preventive Measures of Virtual Cloud Server Based on Cloud Computing." In Advances in Intelligent Systems and Computing, 40–45. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-43306-2_6.
Full textBaldoni, Sara, Giuseppe Celozzi, Alessandro Neri, Marco Carli, and Federica Battisti. "Inferring Anomaly Situation from Multiple Data Sources in Cyber Physical Systems." In Cyber-Physical Security for Critical Infrastructures Protection, 67–76. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-69781-5_5.
Full textPalestini, Luigi, and Giorgio Binotti. "Image/Data Transmission Systems of the Italian Fire and Rescue Service in Emergency Contexts: An Overview of Methods and Technologies to Support Decision-Making." In Enhancing CBRNE Safety & Security: Proceedings of the SICC 2017 Conference, 129–39. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-91791-7_16.
Full textConference papers on the topic "Data transmission systems Security measures"
KANDROUCH, Ibtissame, Chaimae SAADI, Nabil HMINA, and Habiba CHAOUI. "Security Measures Assessment for Big Data Management Systems." In 2019 5th International Conference on Optimization and Applications (ICOA). IEEE, 2019. http://dx.doi.org/10.1109/icoa.2019.8727699.
Full textJankovic, Dejan Z. "Key security measures for personal data protection in IT systems." In 2012 20th Telecommunications Forum Telfor (TELFOR). IEEE, 2012. http://dx.doi.org/10.1109/telfor.2012.6419152.
Full textKrebs, R., E. Lerch, O. Ruhle, S. Gal, F. Lazar, and D. Paunescu. "Future distribution systems with dispersed generation will require network security measures as transmission systems of today." In Energy Society General Meeting. IEEE, 2008. http://dx.doi.org/10.1109/pes.2008.4596211.
Full textHe, Binying. "Discussion on Computer Information Network Security Measures in the Era of Data Autonomy." In 2022 3rd International Conference on Electronics and Sustainable Communication Systems (ICESC). IEEE, 2022. http://dx.doi.org/10.1109/icesc54411.2022.9885661.
Full textBaolong, Lei, Liu Tong, Shao Changyou, Guo Hailong, and Ge Yiyong. "High-reliability Data Transmission Mechanism across Security Zones Supporting Heterogeneous Systems." In 2022 IEEE 5th International Conference on Information Systems and Computer Aided Education (ICISCAE). IEEE, 2022. http://dx.doi.org/10.1109/iciscae55891.2022.9927544.
Full textCh, Smitha Chowdary, Srilakshmi Puli, Lakshmi Viveka K, and M. V. B. T. Santhi. "Machine Learning Based Data Security Model Using Blockchain for Secure Data Transmission in IoT." In 2021 Second International Conference on Electronics and Sustainable Communication Systems (ICESC). IEEE, 2021. http://dx.doi.org/10.1109/icesc51422.2021.9532659.
Full textArmanuzzaman, Md, Kazi Md Rokibul Alam, Md Mehadi Hassan, and Yasuhiko Morimoto. "A secure and efficient data transmission technique using quantum key distribution." In 2017 4th International Conference on Networking, Systems and Security (NSysS). IEEE, 2017. http://dx.doi.org/10.1109/nsyss2.2017.8267797.
Full textLiu, Xinlin, and Weifeng Luo. "Design and Implementation of Data Security Transmission System Based on SSL." In ICISCAE 2021: 2021 IEEE 4th International Conference on Information Systems and Computer Aided Education. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3482632.3487465.
Full textLiu, Qi, Huifeng Liu, Xi Wang, WanJun Li, Guobin Yang, Baletabieke Bahedaer, Long Yan, et al. "The Research on Decommissioning and Abandonment Engineering Practice of Onshore Oilfield: A Case Study of Block 1/2/4 in South Sudan." In SPE Symposium: Decommissioning and Abandonment. SPE, 2021. http://dx.doi.org/10.2118/208494-ms.
Full textJia, Liu, Qingqin Fu, Zhengquan Ang, Qian Zhang, Ling Yi, Tingzheng Feng, Xuesong Bai, and Yuejie Shi. "A Chip Data Security Transmission Method based on Command Control Word Mode." In 2019 2nd International Conference on Information Systems and Computer Aided Education (ICISCAE). IEEE, 2019. http://dx.doi.org/10.1109/iciscae48440.2019.221622.
Full textReports on the topic "Data transmission systems Security measures"
Matenga, Chrispin, and Munguzwe Hichaambwa. A Multi-Phase Assessment of the Effects of COVID-19 on Food Systems and Rural Livelihoods in Zambia. Institute of Development Studies (IDS), December 2021. http://dx.doi.org/10.19088/apra.2021.039.
Full textBeuermann, Diether, Nicolas L. Bottan, Bridget Hoffmann, Jeetendra Khadan, and Diego A. Vera-Cossio. Suriname COVID-19 Survey. Inter-American Development Bank, May 2021. http://dx.doi.org/10.18235/0003266.
Full textDaudelin, Francois, Lina Taing, Lucy Chen, Claudia Abreu Lopes, Adeniyi Francis Fagbamigbe, and Hamid Mehmood. Mapping WASH-related disease risk: A review of risk concepts and methods. United Nations University Institute for Water, Environment and Health, December 2021. http://dx.doi.org/10.53328/uxuo4751.
Full textData Encryption Standard. Gaithersburg, MD: National Institute of Standards and Technology, 1988. http://dx.doi.org/10.6028/nist.fips.46-1.
Full textPayment Systems Report - June of 2021. Banco de la República, February 2022. http://dx.doi.org/10.32468/rept-sist-pag.eng.2021.
Full text