To see the other types of publications on this topic, follow the link: IT Security Systems.

Journal articles on the topic 'IT Security Systems'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'IT Security Systems.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Dudykevyc, Valeriy, Galyna Mykytyn, Taras Kret, and Andrii Rebets. "Security of Cyber-Physical Systems from Concept to Complex Information Security System." Advances in Cyber-Physical Systems 1, no. 2 (2016): 67–75. http://dx.doi.org/10.23939/acps2016.02.067.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Macleod, Ian. "Security Systems." Expository Times 100, no. 10 (1989): 382–83. http://dx.doi.org/10.1177/001452468910001010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sharkov, George. "A System-of-Systems Approach to Cyber Security and Resilience." Information & Security: An International Journal 37 (2017): 69–94. http://dx.doi.org/10.11610/isij.3706.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jahankhani, Hamid, Shantha Fernando, Mathews Z. Nkhoma, and Haralambos Mouratidis. "Information Systems Security." International Journal of Information Security and Privacy 1, no. 3 (2007): 13–25. http://dx.doi.org/10.4018/jisp.2007070102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Everett, H. R. "Robotics security systems." IEEE Instrumentation & Measurement Magazine 6, no. 4 (2003): 30–34. http://dx.doi.org/10.1109/mim.2003.1251480.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kubarenko, Anna, and Pēteris Grabusts. "COMPYTER SYSTEMS SECURITY." HUMAN. ENVIRONMENT. TECHNOLOGIES. Proceedings of the Students International Scientific and Practical Conference, no. 20 (April 20, 2016): 129–33. http://dx.doi.org/10.17770/het2016.20.3547.

Full text
Abstract:
The author in this work provides insight into computer systems security. Themes which are discussed is hardware security, logical security, viruses and computer protection. Nowadays computers are a part of daily life, so each user how to know how to protect computer and its data.
APA, Harvard, Vancouver, ISO, and other styles
7

Stapley, Gerry. "Intelligent security systems." Property Management 4, no. 4 (1986): 328–31. http://dx.doi.org/10.1108/eb006636.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Eckert, Claudia. "Embedded systems security." Datenschutz und Datensicherheit - DuD 36, no. 12 (2012): 861. http://dx.doi.org/10.1007/s11623-012-0289-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

kumar, Amit, and Sunita Sangwan. "Biometric Security Systems." International Journal of Engineering Trends and Technology 11, no. 4 (2014): 169–70. http://dx.doi.org/10.14445/22315381/ijett-v11p233.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bayuk, Jennifer L. "Systems Security Engineering." IEEE Security & Privacy Magazine 9, no. 2 (2011): 72–74. http://dx.doi.org/10.1109/msp.2011.41.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Sherman, Robin L. "Distributed systems security." Computers & Security 11, no. 1 (1992): 24–28. http://dx.doi.org/10.1016/0167-4048(92)90216-e.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Lawson-Smith, Peter. "Building security systems." Wiring Installations and Supplies 1985, no. 22 (1985): 17. http://dx.doi.org/10.1049/wis.1985.0004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Bayuk, Jennifer, and Ali Mostashari. "Measuring systems security." Systems Engineering 16, no. 1 (2012): 1–14. http://dx.doi.org/10.1002/sys.21211.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Oh, Sang-Yeob, Supratip Ghose, Yu-Keum Jeong, Joong-Kyung Ryu, and Jungsoo Han. "Convergence security systems." Journal of Computer Virology and Hacking Techniques 11, no. 3 (2015): 119–21. http://dx.doi.org/10.1007/s11416-015-0248-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Dove, Rick, Mark Winstead, Holy Dunlap, et al. "Democratizing Systems Security." INCOSE International Symposium 33, no. 1 (2023): 86–97. http://dx.doi.org/10.1002/iis2.13010.

Full text
Abstract:
AbstractAs systems security joins the top concerns of systems engineering, the availability and affordability of already scarce security expertise presents a resource barrier and raises questions about the nature of competency needed in the systems engineering team. Workshops in 2022 exploring the eleven strategies outlined in the 2021 roadmap for Security in the Future of Systems Engineering revealed one strategy as centrally synergistic with all the other ten: Stakeholder Alignment. Investigating means and effects of aligning stakeholders on security requirements led to the understanding tha
APA, Harvard, Vancouver, ISO, and other styles
16

Ganzhur, M. A., and A. I. Bryukhovetsky. "Network security systems." Herald of Dagestan State Technical University. Technical Sciences 49, no. 3 (2022): 61–67. http://dx.doi.org/10.21822/2073-6185-2022-49-3-61-67.

Full text
Abstract:
Objective. Network security systems are one of the key players in today's business life. Some networks are private while others are open to the public. Whether your network is private or public, it must be well secured and secure. In this article, we will discuss where network security begins, and describe the general measures taken to secure it.Method. The study is determined by the need to solve the problem of algorithmic and mathematical support for assessing the functional security of a network based on system modeling and finding erroneous positions.Result. Proposed deployment of a privat
APA, Harvard, Vancouver, ISO, and other styles
17

Petersen, DR, and J.-F. Bouisser. "Security Technologies and Techniques: Airport Security Systems." Journal of Testing and Evaluation 22, no. 3 (1994): 247. http://dx.doi.org/10.1520/jte11823j.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

ENNERT, Michal, Branislav MADOŠ, and Zuzana DUDLÁKOVÁ. "DATA VISUALIZATION OF NETWORK SECURITY SYSTEMS." Acta Electrotechnica et Informatica 14, no. 4 (2014): 13–16. http://dx.doi.org/10.15546/aeei-2014-0034.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Petkova, Lilyana, and Vasilisa Pavlova. "Security Analysis on Content Management Systems." Mathematics and Informatics LXV, no. 5 (2022): 423–34. http://dx.doi.org/10.53656/math2022-5-2-sec.

Full text
Abstract:
This paper is dedicated to the challenges of the use of the most popular content management systems (CMS) in software development. Fundamental information about the selected CMS platforms and vulnerability analysis are introduced. The review is made on CMS like Umbraco, Sitecore, WordPress and Drupal categorized in two groups defined by the technology used for development. And as the IT world changes a lot these brings one constant battle against threats. Therefore, this article will add some vulnerabilities analysis of the selected systems since 2014. Results were grouped by common vulnerabil
APA, Harvard, Vancouver, ISO, and other styles
20

Bai, Yan, Lirong Dai, and Juan Li. "Issues and Challenges in Securing eHealth Systems." International Journal of E-Health and Medical Communications 5, no. 1 (2014): 1–19. http://dx.doi.org/10.4018/ijehmc.2014010101.

Full text
Abstract:
With the widespread eHealth usage, security of eHealth services is becoming increasingly important. In this paper, we analyze the security problems in eHealth systems, discuss various approaches of securing health data collection and sharing proposed in the recent literature on eHealth security, and provide comparative evaluations that include advantages and limitations of each approach. Possible future research directions on each approach for enhancing security for eHealth applications are also suggested.
APA, Harvard, Vancouver, ISO, and other styles
21

Thopate, Kaushalya, Sandip Shinde, Rupali Mahajan, et al. "Keyless Security." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 8s (2023): 170–74. http://dx.doi.org/10.17762/ijritcc.v11i8s.7187.

Full text
Abstract:
This research paper introduces a novel approach to improve security and access control in smart door lock systems. The proposed system incorporates multi-factor authentication, combining a numerical keypad, mobile app, and RFID sensor. Each authentication method is associated with a specific lock, offering differentiated access control. Notably, the system requires the simultaneous use of the mobile app and RFID sensor to unlock a designated lock, adding an extra layer of security. To assess the system's effectiveness, a comprehensive study was conducted, considering security, usability, and u
APA, Harvard, Vancouver, ISO, and other styles
22

Gonzalez-Parra, Gilberto, and Abraham J. Arenas. "A Mathematical Model for Social Security Systems with Dynamical Systems." Ingeniería y Ciencia 10, no. 19 (2014): 33–53. http://dx.doi.org/10.17230/ingciencia.10.19.2.

Full text
Abstract:
In this paper it is proposed a mathematical approach based ondynamicsystems to study the effect of the increase in the Social Security normalretirement age on the worker and on the dynamics of retiree populations.In order to simplify this initial effort, the proposed model does not includesome economic variables, such as wage growth, earnings or productivity.Here, we employ numerical simulations of the model to investigate the dy-namics of the labor force under different demographic scenarios. Analysisof this type of model with numerical simulations can help government economic planners make o
APA, Harvard, Vancouver, ISO, and other styles
23

Brumă, Ovidiu-Vasile. "Vulnerabilities of Information Systems." International Journal of Information Security and Cybercrime 9, no. 1 (2020): 9–14. http://dx.doi.org/10.19107/ijisc.2020.01.01.

Full text
Abstract:
Vulnerability of Information Systems is a major concern these days in all spheres of financial, government and even private sectors. There have been limited attempts in addressing the people who use the computers though they are the greatest loophole in information systems security. Even though most of the organizations have realized the value of information and the part it plays in the success of the business, yet only a few take adequate measures in ensuring the security of their information, preventing unauthorized access, securing data from intrusion and unapproved disclosures etc. This pa
APA, Harvard, Vancouver, ISO, and other styles
24

Garasym, Y. R. "Survivable security systems analysis." Military Technical Collection, no. 4 (May 4, 2011): 87–95. http://dx.doi.org/10.33577/2312-4458.4.2011.87-95.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Bjelajac, Željko, and Slavimir Vesić. "Security of information systems." Pravo - teorija i praksa 37, no. 2 (2020): 63–76. http://dx.doi.org/10.5937/ptp2002063b.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Truchan, Jarosław Radosław. "Selected Security Information Systems." Internal Security 12, no. 2 (2020): 38–39. http://dx.doi.org/10.5604/01.3001.0014.6695.

Full text
Abstract:
At present, one of the main areas ensuring the proper functioning of services responsible for security is ICT systems, which are used to obtain, store and process relevant information and to support the performance of statutory tasks. When carrying out their statutory tasks, the Polish police use centralised, advanced IT systems and databases, e.g. the National Police Information System (hereinafter referred to as the KSIP). At the same time, the development of technology generates the need to constantly modify this line of activity. The necessity of being adaptable to the ever-changing enviro
APA, Harvard, Vancouver, ISO, and other styles
27

Andrzejewski, Kamil. "Security information management systems." Management Sciences 24, no. 4 (2020): 1–9. http://dx.doi.org/10.15611/ms.2019.4.01.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Kný, Milan. "Security Management - Systems Approach." Acta Informatica Pragensia 4, no. 3 (2015): 326–35. http://dx.doi.org/10.18267/j.aip.79.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Naemura, Kenji, Kineo Matsui, and Koichi Sakurai. "Security of Multimedia Systems." Journal of the Institute of Image Information and Television Engineers 56, no. 7 (2002): 1048–56. http://dx.doi.org/10.3169/itej.56.1048.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Zorzi, M. "Security in wireless systems." IEEE Wireless Communications 11, no. 1 (2004): 2. http://dx.doi.org/10.1109/mwc.2004.1269708.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Davis, James F. "Information systems security engineering." ACM SIGAda Ada Letters XXIV, no. 4 (2004): 13–18. http://dx.doi.org/10.1145/1046191.1032300.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Uezono, Tadahiro. "Security in Information Systems." Journal of the Society of Mechanical Engineers 95, no. 879 (1992): 147–51. http://dx.doi.org/10.1299/jsmemag.95.879_147.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Atluri, Vijay. "Security for Workflow Systems." Information Security Technical Report 6, no. 2 (2001): 59–68. http://dx.doi.org/10.1016/s1363-4127(01)00207-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Adámek, Milan, Miroslav Matýsek, and Petr Neumann. "Security of Biometric Systems." Procedia Engineering 100 (2015): 169–76. http://dx.doi.org/10.1016/j.proeng.2015.01.355.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Trueman, Peter. "Security for distributed systems." Data Processing 28, no. 4 (1986): 187–90. http://dx.doi.org/10.1016/0011-684x(86)90359-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Dosdale, Terry. "Security in EDIFACT systems." Computer Communications 17, no. 7 (1994): 532–37. http://dx.doi.org/10.1016/0140-3664(94)90107-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Jackson, Keith. "Systems security review - EPS." Computer Fraud & Security Bulletin 9, no. 12 (1987): 1–4. http://dx.doi.org/10.1016/0142-0496(87)90079-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Jackson, Keith. "Security in office systems." Computer Fraud & Security Bulletin 9, no. 12 (1987): 12–14. http://dx.doi.org/10.1016/0142-0496(87)90086-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Jackson, Keith. "Designing Information Systems Security." Computer Fraud & Security Bulletin 11, no. 3 (1989): 15–16. http://dx.doi.org/10.1016/0142-0496(89)90195-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Muftic, Sead. "Security in IBM systems." Computer Audit Update 1992, no. 1 (1992): 21. http://dx.doi.org/10.1016/0960-2593(92)90030-q.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Ravi, Srivaths, Anand Raghunathan, Paul Kocher, and Sunil Hattangady. "Security in embedded systems." ACM Transactions on Embedded Computing Systems 3, no. 3 (2004): 461–91. http://dx.doi.org/10.1145/1015047.1015049.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Kruys, Jan P. "Security of open systems." Computers & Security 8, no. 2 (1989): 139–47. http://dx.doi.org/10.1016/0167-4048(89)90069-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Weber, Arnd, L. Kool, G. Munnichs, and Anders Jacobi. "Security of eGovernment Systems." TATuP - Zeitschrift für Technikfolgenabschätzung in Theorie und Praxis 22, no. 3 (2013): 49–51. http://dx.doi.org/10.14512/tatup.22.3.49.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Wilson, D. L. "Airport information systems security." IEEE Aerospace and Electronic Systems Magazine 18, no. 4 (2003): 25–27. http://dx.doi.org/10.1109/maes.2003.1194086.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Westenkirchner, Suzy. "Integrated Library Security Systems." Library & Archival Security 21, no. 2 (2008): 159–67. http://dx.doi.org/10.1080/01960070802201789.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Zseby, Tanja. "Cyber-Physical Systems – Security." e & i Elektrotechnik und Informationstechnik 135, no. 3 (2018): 249. http://dx.doi.org/10.1007/s00502-018-0619-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Obaidat, Mohammad S., Petros Nicopolitidis, and Weili Han. "Security of e-systems." Security and Communication Networks 7, no. 2 (2013): 322–24. http://dx.doi.org/10.1002/sec.897.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Bolun, Ion, and Arina Alexei. "Aspects of Securing Biomedical Informatics Networks and Systems." Economica, no. 4(130) (January 2025): 60–75. https://doi.org/10.53486/econ.2024.130.060.

Full text
Abstract:
The peculiarities of biomedical informatics systems (HISs) and networks (HINs) from the point of view of cyber security are systematized. Based on the particularities in question and on some statistical data on healthcare cybercrimes, the acuteness of the advanced securing of HISs/HINs is estimated. Cyber security standards in the field, including those related to medical devices, briefly described in the paper, facilitate successful orientation in the multitude of aspects and requirements of cyber security in various practical situations. Also, the paper presents several specific solutions (d
APA, Harvard, Vancouver, ISO, and other styles
49

Malikovich, Karimov Madjit. "Random Number Generation in Operating Systems." American Journal of Applied Science and Technology 5, no. 5 (2025): 74–81. https://doi.org/10.37547/ajast/volume05issue05-17.

Full text
Abstract:
Random number generation (RNG) plays a foundational role in security, cryptography, and system design. Operating systems today implement complex mechanisms for generating random numbers securely. This survey paper presents an overview of RNG techniques used in major operating systems, including Microsoft Windows, Linux, and macOS. We examine entropy sources, deterministic random bit generators (DRBGs), system APIs, and quality testing mechanisms. The survey highlights key differences between OS-level RNG designs and emphasizes best practices, challenges, and potential vulnerabilities. This wor
APA, Harvard, Vancouver, ISO, and other styles
50

Changchit, Chuleeporn. "Security Systems Framework, Security-Related Research, Web Threats." Journal of Information Privacy and Security 7, no. 4 (2011): 1–2. http://dx.doi.org/10.1080/15536548.2011.10855920.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!