Academic literature on the topic 'IT Security Systems'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'IT Security Systems.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "IT Security Systems"

1

Dudykevyc, Valeriy, Galyna Mykytyn, Taras Kret, and Andrii Rebets. "Security of Cyber-Physical Systems from Concept to Complex Information Security System." Advances in Cyber-Physical Systems 1, no. 2 (2016): 67–75. http://dx.doi.org/10.23939/acps2016.02.067.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Macleod, Ian. "Security Systems." Expository Times 100, no. 10 (1989): 382–83. http://dx.doi.org/10.1177/001452468910001010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sharkov, George. "A System-of-Systems Approach to Cyber Security and Resilience." Information & Security: An International Journal 37 (2017): 69–94. http://dx.doi.org/10.11610/isij.3706.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jahankhani, Hamid, Shantha Fernando, Mathews Z. Nkhoma, and Haralambos Mouratidis. "Information Systems Security." International Journal of Information Security and Privacy 1, no. 3 (2007): 13–25. http://dx.doi.org/10.4018/jisp.2007070102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Everett, H. R. "Robotics security systems." IEEE Instrumentation & Measurement Magazine 6, no. 4 (2003): 30–34. http://dx.doi.org/10.1109/mim.2003.1251480.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kubarenko, Anna, and Pēteris Grabusts. "COMPYTER SYSTEMS SECURITY." HUMAN. ENVIRONMENT. TECHNOLOGIES. Proceedings of the Students International Scientific and Practical Conference, no. 20 (April 20, 2016): 129–33. http://dx.doi.org/10.17770/het2016.20.3547.

Full text
Abstract:
The author in this work provides insight into computer systems security. Themes which are discussed is hardware security, logical security, viruses and computer protection. Nowadays computers are a part of daily life, so each user how to know how to protect computer and its data.
APA, Harvard, Vancouver, ISO, and other styles
7

Stapley, Gerry. "Intelligent security systems." Property Management 4, no. 4 (1986): 328–31. http://dx.doi.org/10.1108/eb006636.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Eckert, Claudia. "Embedded systems security." Datenschutz und Datensicherheit - DuD 36, no. 12 (2012): 861. http://dx.doi.org/10.1007/s11623-012-0289-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

kumar, Amit, and Sunita Sangwan. "Biometric Security Systems." International Journal of Engineering Trends and Technology 11, no. 4 (2014): 169–70. http://dx.doi.org/10.14445/22315381/ijett-v11p233.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bayuk, Jennifer L. "Systems Security Engineering." IEEE Security & Privacy Magazine 9, no. 2 (2011): 72–74. http://dx.doi.org/10.1109/msp.2011.41.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "IT Security Systems"

1

He, Ying. "Generic security templates for information system security arguments : mapping security arguments within healthcare systems." Thesis, University of Glasgow, 2014. http://theses.gla.ac.uk/5773/.

Full text
Abstract:
Industry reports indicate that the number of security incidents happened in healthcare organisation is increasing. Lessons learned (i.e. the causes of a security incident and the recommendations intended to avoid any recurrence) from those security incidents should ideally inform information security management systems (ISMS). The sharing of the lessons learned is an essential activity in the “follow-up” phase of security incident response lifecycle, which has long been addressed but not given enough attention in academic and industry. This dissertation proposes a novel approach, the Generic S
APA, Harvard, Vancouver, ISO, and other styles
2

Antonsson, Martin. "Securing XML Web Services : using WS-security." Thesis, University West, Department of Informatics and Mathematics, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-580.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Крапивний, Іван Васильович, Иван Васильевич Крапивный, Ivan Vasylovych Krapyvnyi, et al. "Information security economic systems in national security country." Thesis, Sumy State University, 2015. http://essuir.sumdu.edu.ua/handle/123456789/43592.

Full text
Abstract:
In today's world, information security becomes vital for ensuring the interests of man, society and the state and the most important, part of the whole system of national security. Doctrine considers all the work in the field of information based on the Concept of National Security of Ukraine. The doctrine identifies four main components of Ukraine's national interests in the information sphere.
APA, Harvard, Vancouver, ISO, and other styles
4

Benzina, Hedi. "Enforcing virtualized systems security." Phd thesis, École normale supérieure de Cachan - ENS Cachan, 2012. http://tel.archives-ouvertes.fr/tel-00846513.

Full text
Abstract:
Virtual machine technology is rapidly gaining acceptance as a fundamental building block in enterprise data centers. It is most known for improving efficiency and ease of management. However, the central issue of this technology is security. We propose in this thesis to enforce the security of virtualized systems and introduce new approaches that deal with different security aspects related not only to the technology itself but also to its deployment and maintenance. We first propose a new architecture that offers real-time supervision of a complete virtualized architecture. The idea is to imp
APA, Harvard, Vancouver, ISO, and other styles
5

Ismail, Roslan. "Security of reputation systems." Thesis, Queensland University of Technology, 2004. https://eprints.qut.edu.au/15964/1/Roslan_Ismail_Thesis.pdf.

Full text
Abstract:
Reputation systems have the potential of improving the quality of on-line markets by identifying fraudulent users and subsequently dealing with these users can be prevented. The behaviour of participants involved in e-commerce can be recorded and then this information made available to potential transaction partners to make decisions to choose a suitable counterpart. Unfortunately current reputation systems suffer from various vulnerabilities. Solutions for many of these problems will be discussed. One of the major threats is that of unfair feedback. A large number of negative or positi
APA, Harvard, Vancouver, ISO, and other styles
6

Ismail, Roslan. "Security of reputation systems." Queensland University of Technology, 2004. http://eprints.qut.edu.au/15964/.

Full text
Abstract:
Reputation systems have the potential of improving the quality of on-line markets by identifying fraudulent users and subsequently dealing with these users can be prevented. The behaviour of participants involved in e-commerce can be recorded and then this information made available to potential transaction partners to make decisions to choose a suitable counterpart. Unfortunately current reputation systems suffer from various vulnerabilities. Solutions for many of these problems will be discussed. One of the major threats is that of unfair feedback. A large number of negative or positi
APA, Harvard, Vancouver, ISO, and other styles
7

Thulnoon, A. A. T. "Efficient runtime security system for decentralised distributed systems." Thesis, Liverpool John Moores University, 2018. http://researchonline.ljmu.ac.uk/9043/.

Full text
Abstract:
Distributed systems can be defined as systems that are scattered over geographical distances and provide different activities through communication, processing, data transfer and so on. Thus, increasing the cooperation, efficiency, and reliability to deal with users and data resources jointly. For this reason, distributed systems have been shown to be a promising infrastructure for most applications in the digital world. Despite their advantages, keeping these systems secure, is a complex task because of the unconventional nature of distributed systems which can produce many security problems
APA, Harvard, Vancouver, ISO, and other styles
8

Corteggiani, Nassim. "Towards system-wide security analysis of embedded systems." Electronic Thesis or Diss., Sorbonne université, 2020. http://www.theses.fr/2020SORUS285.

Full text
Abstract:
Cette thèse se consacre à l'amélioration des techniques d'analyse dynamiques permettant la vérification de logiciels conçus pour des systèmes embarqués, couramment appelé micrologiciel. Au vu de l'augmentation significative de la connectivité des appareils électroniques, les préoccupations concernant leur sécurité s'intensifient. Les conséquences d'une faille de sécurité sur ces appareils peuvent impliquer des répercussions économiques non négligeables et des difficultés techniques importantes pour appliquer un correctif. C’est le cas notamment des amorceurs de code qui sont généralement stock
APA, Harvard, Vancouver, ISO, and other styles
9

Caronni, Germano. "Dynamic security in communication systems /." [S.l.] : [s.n.], 1999. http://e-collection.ethbib.ethz.ch/show?type=diss&nr=13156.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lessner, Dirk. "Network security for embedded systems /." [St. Lucia, Qld.], 2005. http://adt.library.uq.edu.au/public/adt-QU20060215.160952/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "IT Security Systems"

1

MSI. Electronic security systems. Marketing Research for Industry, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tripathy, Somanath, Rudrapatna K. Shyamasundar, and Rajiv Ranjan, eds. Information Systems Security. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-92571-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ganapathy, Vinod, Trent Jaeger, and R. K. Shyamasundar, eds. Information Systems Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-05171-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Prakash, Atul, and Rudrapatna Shyamasundar, eds. Information Systems Security. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13841-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Garg, Deepak, N. V. Narendra Kumar, and Rudrapatna K. Shyamasundar, eds. Information Systems Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-36945-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Venkatakrishnan, Venkat, and Diganta Goswami, eds. Information Systems Security. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35130-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ray, Indrajit, Manoj Singh Gaur, Mauro Conti, Dheeraj Sanghi, and V. Kamakoti, eds. Information Systems Security. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49806-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shyamasundar, Rudrapatna K., Virendra Singh, and Jaideep Vaidya, eds. Information Systems Security. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-72598-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jajodia, Sushil, and Chandan Mazumdar, eds. Information Systems Security. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25560-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Prakash, Atul, and Indranil Sen Gupta, eds. Information Systems Security. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10772-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "IT Security Systems"

1

Weik, Martin H. "systems security." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_18959.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lenhard, Thomas H. "Telephone Systems." In Data Security. Springer Fachmedien Wiesbaden, 2022. http://dx.doi.org/10.1007/978-3-658-35494-7_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jaume, Mathieu. "Security Rules versus Security Properties." In Information Systems Security. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-17714-9_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Seaman, Jim. "Information Systems Security." In Protective Security. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6908-4_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Talarico, Luca, Kenneth Sörensen, Genserik Reniers, and Johan Springael. "Pipeline Security." In Securing Transportation Systems. John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781119078203.ch15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Magnuson, J. A., and Dennis E. Leber. "Health Systems Security." In Health Informatics. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-41215-9_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Weik, Martin H. "systems security initiative." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_18960.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Weik, Martin H. "information systems security." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_8970.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bowe, Jürgen, B. Kordowski, Andreas Walther, and Jan Lichtermann. "Vehicle security systems." In Automotive Mechatronics. Springer Fachmedien Wiesbaden, 2014. http://dx.doi.org/10.1007/978-3-658-03975-2_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tjøstheim, Thomas, Thea Peacock, and Peter Y. A. Ryan. "A Model for System-Based Analysis of Voting Systems." In Security Protocols. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-17773-6_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "IT Security Systems"

1

Gilliland, Gary. "Security in Avionics Systems." In Vertical Flight Society 80th Annual Forum & Technology Display. The Vertical Flight Society, 2024. http://dx.doi.org/10.4050/f-0080-2024-1061.

Full text
Abstract:
There is a shift in the industry driving avionics manufactures to provide more interactive connectivity than they have had to in the past. The increasing threat of cyber security attacks in our communication systems is an increasing problem in our society and the avionics industry cannot ignore the fact that the threats are real and they must protect the systems from these attacks. Another element driving these concerns is the implementation of the FAA's NextGen or EASA's SESAR technologies which will require avionics vendors to replace their proprietary, relatively isolated embedded computer
APA, Harvard, Vancouver, ISO, and other styles
2

Imanbayeva, Akmaral, and Rabiga Syzdykova. "THE SECURITY REQUIREMENTS FOR CYBER-PHYSICAL SYSTEMS." In 24th SGEM International Multidisciplinary Scientific GeoConference 2024. STEF92 Technology, 2024. https://doi.org/10.5593/sgem2024/2.1/s07.10.

Full text
Abstract:
Cyber-physical physical systems find their place in all spheres of modern life and are in a stage of rapid development. The prospects for the development of cyber-physical systems affect the interests of society as a whole, so they should be considered not only in a technical, but also in a broader socio-cultural aspect. The scope of application of cyber-physical systems extends to industrial systems, energy, transport and military systems, as well as all types of life support systems. Researchers repeatedly consider issues related to ensuring the reliability and security of cyber-physical sys
APA, Harvard, Vancouver, ISO, and other styles
3

Farroha, Bassam S., and Deborah L. Farroha. "Cyber security components for pervasive Enterprise Security Management and the virtualization aspects." In 2010 4th Annual IEEE Systems Conference. IEEE, 2010. http://dx.doi.org/10.1109/systems.2010.5482328.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kabbani, Nawwar, Scott Tilley, and Lewis Pearson. "Towards an evaluation framework for SOA security testing tools." In 2010 4th Annual IEEE Systems Conference. IEEE, 2010. http://dx.doi.org/10.1109/systems.2010.5482322.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hentea, Mariana. "Improving Security for SCADA Control Systems." In InSITE 2008: Informing Science + IT Education Conference. Informing Science Institute, 2008. http://dx.doi.org/10.28945/3185.

Full text
Abstract:
The continuous growth of cyber security threats and attacks including the increasing sophistication of malware is impacting the security of critical infrastructure, industrial control systems, and Supervisory Control and Data Acquisition (SCADA) control systems. The reliable operation of modern infrastructures depends on computerized systems and SCADA systems. Since the emergence of Internet and World Wide Web technologies, these systems were integrated with business systems and became more exposed to cyber threats. There is a growing concern about the security and safety of the SCADA control
APA, Harvard, Vancouver, ISO, and other styles
6

He, Y., and C. W. Johnson. "Generic security cases for information system security in healthcare systems." In 7th IET International Conference on System Safety, incorporating the Cyber Security Conference 2012. Institution of Engineering and Technology, 2012. http://dx.doi.org/10.1049/cp.2012.1507.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Thuraisingham, Bhavani. "Multimedia systems security." In the 9th workshop. ACM Press, 2007. http://dx.doi.org/10.1145/1288869.1288870.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kolev, Ivan S., and Ivelina S. Stoeva. "Laser security systems." In Temp Symposium Entry, edited by Vladislav Y. Panchenko and Nikola V. Sabotinov. SPIE, 2004. http://dx.doi.org/10.1117/12.563122.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

ADASCALITEI, Ioan. "MOBILE SYSTEMS SECURITY." In 18th International Conference on INFORMATICS in ECONOMY. Education, Research and Business Technologies. Bucharest University of Economic Studies Press, 2019. http://dx.doi.org/10.12948/ie2019.06.05.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Dini, Gianluca, and Angelica Lo Duca. "On securing publish-subscribe systems with security groups." In 2009 IEEE Symposium on Computers and Communications (ISCC). IEEE, 2009. http://dx.doi.org/10.1109/iscc.2009.5202278.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "IT Security Systems"

1

Bayuk, Jennifer, Dennis Barnabe, Jonathan Goodnight, et al. Systems Security Engineering. Defense Technical Information Center, 2010. http://dx.doi.org/10.21236/ada637296.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Everett, H. R. Robotic Security Systems. Defense Technical Information Center, 2003. http://dx.doi.org/10.21236/ada422075.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Barkley, John. Security in open systems. National Institute of Standards and Technology, 1994. http://dx.doi.org/10.6028/nist.sp.800-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Faculjak, D. A. Implementing security measures for computer-based security systems. Office of Scientific and Technical Information (OSTI), 1989. http://dx.doi.org/10.2172/6137987.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ganger, Gregory R. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security (Self-Securing Devices). Defense Technical Information Center, 2007. http://dx.doi.org/10.21236/ada465393.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ackermann, Mark R. Trusting National Security Systems: Issues for National Security Leadership. Office of Scientific and Technical Information (OSTI), 2014. http://dx.doi.org/10.2172/1150236.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gage, Douglas W., W. D. Bryan, and Hoa G. Nguyen. Internetting Tactical Security Sensor Systems. Defense Technical Information Center, 1998. http://dx.doi.org/10.21236/ada422499.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Nazario, Noel. Security labels for open systems:. National Institute of Standards and Technology, 1990. http://dx.doi.org/10.6028/nist.ir.4362.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Steinauer, Dennis D. Security of personal computer systems. National Bureau of Standards, 1985. http://dx.doi.org/10.6028/nbs.sp.500-120.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kloske, John, and Scot T. Tripp. Advanced Underwater Port Security Systems. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada626957.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!