Academic literature on the topic 'IT Security Systems'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'IT Security Systems.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "IT Security Systems"
Dudykevyc, Valeriy, Galyna Mykytyn, Taras Kret, and Andrii Rebets. "Security of Cyber-Physical Systems from Concept to Complex Information Security System." Advances in Cyber-Physical Systems 1, no. 2 (2016): 67–75. http://dx.doi.org/10.23939/acps2016.02.067.
Full textMacleod, Ian. "Security Systems." Expository Times 100, no. 10 (1989): 382–83. http://dx.doi.org/10.1177/001452468910001010.
Full textSharkov, George. "A System-of-Systems Approach to Cyber Security and Resilience." Information & Security: An International Journal 37 (2017): 69–94. http://dx.doi.org/10.11610/isij.3706.
Full textJahankhani, Hamid, Shantha Fernando, Mathews Z. Nkhoma, and Haralambos Mouratidis. "Information Systems Security." International Journal of Information Security and Privacy 1, no. 3 (2007): 13–25. http://dx.doi.org/10.4018/jisp.2007070102.
Full textEverett, H. R. "Robotics security systems." IEEE Instrumentation & Measurement Magazine 6, no. 4 (2003): 30–34. http://dx.doi.org/10.1109/mim.2003.1251480.
Full textKubarenko, Anna, and Pēteris Grabusts. "COMPYTER SYSTEMS SECURITY." HUMAN. ENVIRONMENT. TECHNOLOGIES. Proceedings of the Students International Scientific and Practical Conference, no. 20 (April 20, 2016): 129–33. http://dx.doi.org/10.17770/het2016.20.3547.
Full textStapley, Gerry. "Intelligent security systems." Property Management 4, no. 4 (1986): 328–31. http://dx.doi.org/10.1108/eb006636.
Full textEckert, Claudia. "Embedded systems security." Datenschutz und Datensicherheit - DuD 36, no. 12 (2012): 861. http://dx.doi.org/10.1007/s11623-012-0289-x.
Full textkumar, Amit, and Sunita Sangwan. "Biometric Security Systems." International Journal of Engineering Trends and Technology 11, no. 4 (2014): 169–70. http://dx.doi.org/10.14445/22315381/ijett-v11p233.
Full textBayuk, Jennifer L. "Systems Security Engineering." IEEE Security & Privacy Magazine 9, no. 2 (2011): 72–74. http://dx.doi.org/10.1109/msp.2011.41.
Full textDissertations / Theses on the topic "IT Security Systems"
He, Ying. "Generic security templates for information system security arguments : mapping security arguments within healthcare systems." Thesis, University of Glasgow, 2014. http://theses.gla.ac.uk/5773/.
Full textAntonsson, Martin. "Securing XML Web Services : using WS-security." Thesis, University West, Department of Informatics and Mathematics, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-580.
Full textКрапивний, Іван Васильович, Иван Васильевич Крапивный, Ivan Vasylovych Krapyvnyi, et al. "Information security economic systems in national security country." Thesis, Sumy State University, 2015. http://essuir.sumdu.edu.ua/handle/123456789/43592.
Full textBenzina, Hedi. "Enforcing virtualized systems security." Phd thesis, École normale supérieure de Cachan - ENS Cachan, 2012. http://tel.archives-ouvertes.fr/tel-00846513.
Full textIsmail, Roslan. "Security of reputation systems." Thesis, Queensland University of Technology, 2004. https://eprints.qut.edu.au/15964/1/Roslan_Ismail_Thesis.pdf.
Full textIsmail, Roslan. "Security of reputation systems." Queensland University of Technology, 2004. http://eprints.qut.edu.au/15964/.
Full textThulnoon, A. A. T. "Efficient runtime security system for decentralised distributed systems." Thesis, Liverpool John Moores University, 2018. http://researchonline.ljmu.ac.uk/9043/.
Full textCorteggiani, Nassim. "Towards system-wide security analysis of embedded systems." Electronic Thesis or Diss., Sorbonne université, 2020. http://www.theses.fr/2020SORUS285.
Full textCaronni, Germano. "Dynamic security in communication systems /." [S.l.] : [s.n.], 1999. http://e-collection.ethbib.ethz.ch/show?type=diss&nr=13156.
Full textLessner, Dirk. "Network security for embedded systems /." [St. Lucia, Qld.], 2005. http://adt.library.uq.edu.au/public/adt-QU20060215.160952/index.html.
Full textBooks on the topic "IT Security Systems"
Tripathy, Somanath, Rudrapatna K. Shyamasundar, and Rajiv Ranjan, eds. Information Systems Security. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-92571-0.
Full textGanapathy, Vinod, Trent Jaeger, and R. K. Shyamasundar, eds. Information Systems Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-05171-6.
Full textPrakash, Atul, and Rudrapatna Shyamasundar, eds. Information Systems Security. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13841-1.
Full textGarg, Deepak, N. V. Narendra Kumar, and Rudrapatna K. Shyamasundar, eds. Information Systems Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-36945-3.
Full textVenkatakrishnan, Venkat, and Diganta Goswami, eds. Information Systems Security. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35130-3.
Full textRay, Indrajit, Manoj Singh Gaur, Mauro Conti, Dheeraj Sanghi, and V. Kamakoti, eds. Information Systems Security. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49806-5.
Full textShyamasundar, Rudrapatna K., Virendra Singh, and Jaideep Vaidya, eds. Information Systems Security. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-72598-7.
Full textJajodia, Sushil, and Chandan Mazumdar, eds. Information Systems Security. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25560-1.
Full textPrakash, Atul, and Indranil Sen Gupta, eds. Information Systems Security. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10772-6.
Full textBook chapters on the topic "IT Security Systems"
Weik, Martin H. "systems security." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_18959.
Full textLenhard, Thomas H. "Telephone Systems." In Data Security. Springer Fachmedien Wiesbaden, 2022. http://dx.doi.org/10.1007/978-3-658-35494-7_8.
Full textJaume, Mathieu. "Security Rules versus Security Properties." In Information Systems Security. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-17714-9_17.
Full textSeaman, Jim. "Information Systems Security." In Protective Security. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6908-4_8.
Full textTalarico, Luca, Kenneth Sörensen, Genserik Reniers, and Johan Springael. "Pipeline Security." In Securing Transportation Systems. John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781119078203.ch15.
Full textMagnuson, J. A., and Dennis E. Leber. "Health Systems Security." In Health Informatics. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-41215-9_10.
Full textWeik, Martin H. "systems security initiative." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_18960.
Full textWeik, Martin H. "information systems security." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_8970.
Full textBowe, Jürgen, B. Kordowski, Andreas Walther, and Jan Lichtermann. "Vehicle security systems." In Automotive Mechatronics. Springer Fachmedien Wiesbaden, 2014. http://dx.doi.org/10.1007/978-3-658-03975-2_26.
Full textTjøstheim, Thomas, Thea Peacock, and Peter Y. A. Ryan. "A Model for System-Based Analysis of Voting Systems." In Security Protocols. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-17773-6_13.
Full textConference papers on the topic "IT Security Systems"
Gilliland, Gary. "Security in Avionics Systems." In Vertical Flight Society 80th Annual Forum & Technology Display. The Vertical Flight Society, 2024. http://dx.doi.org/10.4050/f-0080-2024-1061.
Full textImanbayeva, Akmaral, and Rabiga Syzdykova. "THE SECURITY REQUIREMENTS FOR CYBER-PHYSICAL SYSTEMS." In 24th SGEM International Multidisciplinary Scientific GeoConference 2024. STEF92 Technology, 2024. https://doi.org/10.5593/sgem2024/2.1/s07.10.
Full textFarroha, Bassam S., and Deborah L. Farroha. "Cyber security components for pervasive Enterprise Security Management and the virtualization aspects." In 2010 4th Annual IEEE Systems Conference. IEEE, 2010. http://dx.doi.org/10.1109/systems.2010.5482328.
Full textKabbani, Nawwar, Scott Tilley, and Lewis Pearson. "Towards an evaluation framework for SOA security testing tools." In 2010 4th Annual IEEE Systems Conference. IEEE, 2010. http://dx.doi.org/10.1109/systems.2010.5482322.
Full textHentea, Mariana. "Improving Security for SCADA Control Systems." In InSITE 2008: Informing Science + IT Education Conference. Informing Science Institute, 2008. http://dx.doi.org/10.28945/3185.
Full textHe, Y., and C. W. Johnson. "Generic security cases for information system security in healthcare systems." In 7th IET International Conference on System Safety, incorporating the Cyber Security Conference 2012. Institution of Engineering and Technology, 2012. http://dx.doi.org/10.1049/cp.2012.1507.
Full textThuraisingham, Bhavani. "Multimedia systems security." In the 9th workshop. ACM Press, 2007. http://dx.doi.org/10.1145/1288869.1288870.
Full textKolev, Ivan S., and Ivelina S. Stoeva. "Laser security systems." In Temp Symposium Entry, edited by Vladislav Y. Panchenko and Nikola V. Sabotinov. SPIE, 2004. http://dx.doi.org/10.1117/12.563122.
Full textADASCALITEI, Ioan. "MOBILE SYSTEMS SECURITY." In 18th International Conference on INFORMATICS in ECONOMY. Education, Research and Business Technologies. Bucharest University of Economic Studies Press, 2019. http://dx.doi.org/10.12948/ie2019.06.05.
Full textDini, Gianluca, and Angelica Lo Duca. "On securing publish-subscribe systems with security groups." In 2009 IEEE Symposium on Computers and Communications (ISCC). IEEE, 2009. http://dx.doi.org/10.1109/iscc.2009.5202278.
Full textReports on the topic "IT Security Systems"
Bayuk, Jennifer, Dennis Barnabe, Jonathan Goodnight, et al. Systems Security Engineering. Defense Technical Information Center, 2010. http://dx.doi.org/10.21236/ada637296.
Full textEverett, H. R. Robotic Security Systems. Defense Technical Information Center, 2003. http://dx.doi.org/10.21236/ada422075.
Full textBarkley, John. Security in open systems. National Institute of Standards and Technology, 1994. http://dx.doi.org/10.6028/nist.sp.800-7.
Full textFaculjak, D. A. Implementing security measures for computer-based security systems. Office of Scientific and Technical Information (OSTI), 1989. http://dx.doi.org/10.2172/6137987.
Full textGanger, Gregory R. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security (Self-Securing Devices). Defense Technical Information Center, 2007. http://dx.doi.org/10.21236/ada465393.
Full textAckermann, Mark R. Trusting National Security Systems: Issues for National Security Leadership. Office of Scientific and Technical Information (OSTI), 2014. http://dx.doi.org/10.2172/1150236.
Full textGage, Douglas W., W. D. Bryan, and Hoa G. Nguyen. Internetting Tactical Security Sensor Systems. Defense Technical Information Center, 1998. http://dx.doi.org/10.21236/ada422499.
Full textNazario, Noel. Security labels for open systems:. National Institute of Standards and Technology, 1990. http://dx.doi.org/10.6028/nist.ir.4362.
Full textSteinauer, Dennis D. Security of personal computer systems. National Bureau of Standards, 1985. http://dx.doi.org/10.6028/nbs.sp.500-120.
Full textKloske, John, and Scot T. Tripp. Advanced Underwater Port Security Systems. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada626957.
Full text