Journal articles on the topic 'IT Security Systems'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'IT Security Systems.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Dudykevyc, Valeriy, Galyna Mykytyn, Taras Kret, and Andrii Rebets. "Security of Cyber-Physical Systems from Concept to Complex Information Security System." Advances in Cyber-Physical Systems 1, no. 2 (2016): 67–75. http://dx.doi.org/10.23939/acps2016.02.067.
Full textMacleod, Ian. "Security Systems." Expository Times 100, no. 10 (1989): 382–83. http://dx.doi.org/10.1177/001452468910001010.
Full textSharkov, George. "A System-of-Systems Approach to Cyber Security and Resilience." Information & Security: An International Journal 37 (2017): 69–94. http://dx.doi.org/10.11610/isij.3706.
Full textJahankhani, Hamid, Shantha Fernando, Mathews Z. Nkhoma, and Haralambos Mouratidis. "Information Systems Security." International Journal of Information Security and Privacy 1, no. 3 (2007): 13–25. http://dx.doi.org/10.4018/jisp.2007070102.
Full textEverett, H. R. "Robotics security systems." IEEE Instrumentation & Measurement Magazine 6, no. 4 (2003): 30–34. http://dx.doi.org/10.1109/mim.2003.1251480.
Full textKubarenko, Anna, and Pēteris Grabusts. "COMPYTER SYSTEMS SECURITY." HUMAN. ENVIRONMENT. TECHNOLOGIES. Proceedings of the Students International Scientific and Practical Conference, no. 20 (April 20, 2016): 129–33. http://dx.doi.org/10.17770/het2016.20.3547.
Full textStapley, Gerry. "Intelligent security systems." Property Management 4, no. 4 (1986): 328–31. http://dx.doi.org/10.1108/eb006636.
Full textEckert, Claudia. "Embedded systems security." Datenschutz und Datensicherheit - DuD 36, no. 12 (2012): 861. http://dx.doi.org/10.1007/s11623-012-0289-x.
Full textkumar, Amit, and Sunita Sangwan. "Biometric Security Systems." International Journal of Engineering Trends and Technology 11, no. 4 (2014): 169–70. http://dx.doi.org/10.14445/22315381/ijett-v11p233.
Full textBayuk, Jennifer L. "Systems Security Engineering." IEEE Security & Privacy Magazine 9, no. 2 (2011): 72–74. http://dx.doi.org/10.1109/msp.2011.41.
Full textSherman, Robin L. "Distributed systems security." Computers & Security 11, no. 1 (1992): 24–28. http://dx.doi.org/10.1016/0167-4048(92)90216-e.
Full textLawson-Smith, Peter. "Building security systems." Wiring Installations and Supplies 1985, no. 22 (1985): 17. http://dx.doi.org/10.1049/wis.1985.0004.
Full textBayuk, Jennifer, and Ali Mostashari. "Measuring systems security." Systems Engineering 16, no. 1 (2012): 1–14. http://dx.doi.org/10.1002/sys.21211.
Full textOh, Sang-Yeob, Supratip Ghose, Yu-Keum Jeong, Joong-Kyung Ryu, and Jungsoo Han. "Convergence security systems." Journal of Computer Virology and Hacking Techniques 11, no. 3 (2015): 119–21. http://dx.doi.org/10.1007/s11416-015-0248-9.
Full textDove, Rick, Mark Winstead, Holy Dunlap, et al. "Democratizing Systems Security." INCOSE International Symposium 33, no. 1 (2023): 86–97. http://dx.doi.org/10.1002/iis2.13010.
Full textGanzhur, M. A., and A. I. Bryukhovetsky. "Network security systems." Herald of Dagestan State Technical University. Technical Sciences 49, no. 3 (2022): 61–67. http://dx.doi.org/10.21822/2073-6185-2022-49-3-61-67.
Full textPetersen, DR, and J.-F. Bouisser. "Security Technologies and Techniques: Airport Security Systems." Journal of Testing and Evaluation 22, no. 3 (1994): 247. http://dx.doi.org/10.1520/jte11823j.
Full textENNERT, Michal, Branislav MADOŠ, and Zuzana DUDLÁKOVÁ. "DATA VISUALIZATION OF NETWORK SECURITY SYSTEMS." Acta Electrotechnica et Informatica 14, no. 4 (2014): 13–16. http://dx.doi.org/10.15546/aeei-2014-0034.
Full textPetkova, Lilyana, and Vasilisa Pavlova. "Security Analysis on Content Management Systems." Mathematics and Informatics LXV, no. 5 (2022): 423–34. http://dx.doi.org/10.53656/math2022-5-2-sec.
Full textBai, Yan, Lirong Dai, and Juan Li. "Issues and Challenges in Securing eHealth Systems." International Journal of E-Health and Medical Communications 5, no. 1 (2014): 1–19. http://dx.doi.org/10.4018/ijehmc.2014010101.
Full textThopate, Kaushalya, Sandip Shinde, Rupali Mahajan, et al. "Keyless Security." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 8s (2023): 170–74. http://dx.doi.org/10.17762/ijritcc.v11i8s.7187.
Full textGonzalez-Parra, Gilberto, and Abraham J. Arenas. "A Mathematical Model for Social Security Systems with Dynamical Systems." Ingeniería y Ciencia 10, no. 19 (2014): 33–53. http://dx.doi.org/10.17230/ingciencia.10.19.2.
Full textBrumă, Ovidiu-Vasile. "Vulnerabilities of Information Systems." International Journal of Information Security and Cybercrime 9, no. 1 (2020): 9–14. http://dx.doi.org/10.19107/ijisc.2020.01.01.
Full textGarasym, Y. R. "Survivable security systems analysis." Military Technical Collection, no. 4 (May 4, 2011): 87–95. http://dx.doi.org/10.33577/2312-4458.4.2011.87-95.
Full textBjelajac, Željko, and Slavimir Vesić. "Security of information systems." Pravo - teorija i praksa 37, no. 2 (2020): 63–76. http://dx.doi.org/10.5937/ptp2002063b.
Full textTruchan, Jarosław Radosław. "Selected Security Information Systems." Internal Security 12, no. 2 (2020): 38–39. http://dx.doi.org/10.5604/01.3001.0014.6695.
Full textAndrzejewski, Kamil. "Security information management systems." Management Sciences 24, no. 4 (2020): 1–9. http://dx.doi.org/10.15611/ms.2019.4.01.
Full textKný, Milan. "Security Management - Systems Approach." Acta Informatica Pragensia 4, no. 3 (2015): 326–35. http://dx.doi.org/10.18267/j.aip.79.
Full textNaemura, Kenji, Kineo Matsui, and Koichi Sakurai. "Security of Multimedia Systems." Journal of the Institute of Image Information and Television Engineers 56, no. 7 (2002): 1048–56. http://dx.doi.org/10.3169/itej.56.1048.
Full textZorzi, M. "Security in wireless systems." IEEE Wireless Communications 11, no. 1 (2004): 2. http://dx.doi.org/10.1109/mwc.2004.1269708.
Full textDavis, James F. "Information systems security engineering." ACM SIGAda Ada Letters XXIV, no. 4 (2004): 13–18. http://dx.doi.org/10.1145/1046191.1032300.
Full textUezono, Tadahiro. "Security in Information Systems." Journal of the Society of Mechanical Engineers 95, no. 879 (1992): 147–51. http://dx.doi.org/10.1299/jsmemag.95.879_147.
Full textAtluri, Vijay. "Security for Workflow Systems." Information Security Technical Report 6, no. 2 (2001): 59–68. http://dx.doi.org/10.1016/s1363-4127(01)00207-2.
Full textAdámek, Milan, Miroslav Matýsek, and Petr Neumann. "Security of Biometric Systems." Procedia Engineering 100 (2015): 169–76. http://dx.doi.org/10.1016/j.proeng.2015.01.355.
Full textTrueman, Peter. "Security for distributed systems." Data Processing 28, no. 4 (1986): 187–90. http://dx.doi.org/10.1016/0011-684x(86)90359-x.
Full textDosdale, Terry. "Security in EDIFACT systems." Computer Communications 17, no. 7 (1994): 532–37. http://dx.doi.org/10.1016/0140-3664(94)90107-4.
Full textJackson, Keith. "Systems security review - EPS." Computer Fraud & Security Bulletin 9, no. 12 (1987): 1–4. http://dx.doi.org/10.1016/0142-0496(87)90079-8.
Full textJackson, Keith. "Security in office systems." Computer Fraud & Security Bulletin 9, no. 12 (1987): 12–14. http://dx.doi.org/10.1016/0142-0496(87)90086-5.
Full textJackson, Keith. "Designing Information Systems Security." Computer Fraud & Security Bulletin 11, no. 3 (1989): 15–16. http://dx.doi.org/10.1016/0142-0496(89)90195-1.
Full textMuftic, Sead. "Security in IBM systems." Computer Audit Update 1992, no. 1 (1992): 21. http://dx.doi.org/10.1016/0960-2593(92)90030-q.
Full textRavi, Srivaths, Anand Raghunathan, Paul Kocher, and Sunil Hattangady. "Security in embedded systems." ACM Transactions on Embedded Computing Systems 3, no. 3 (2004): 461–91. http://dx.doi.org/10.1145/1015047.1015049.
Full textKruys, Jan P. "Security of open systems." Computers & Security 8, no. 2 (1989): 139–47. http://dx.doi.org/10.1016/0167-4048(89)90069-2.
Full textWeber, Arnd, L. Kool, G. Munnichs, and Anders Jacobi. "Security of eGovernment Systems." TATuP - Zeitschrift für Technikfolgenabschätzung in Theorie und Praxis 22, no. 3 (2013): 49–51. http://dx.doi.org/10.14512/tatup.22.3.49.
Full textWilson, D. L. "Airport information systems security." IEEE Aerospace and Electronic Systems Magazine 18, no. 4 (2003): 25–27. http://dx.doi.org/10.1109/maes.2003.1194086.
Full textWestenkirchner, Suzy. "Integrated Library Security Systems." Library & Archival Security 21, no. 2 (2008): 159–67. http://dx.doi.org/10.1080/01960070802201789.
Full textZseby, Tanja. "Cyber-Physical Systems – Security." e & i Elektrotechnik und Informationstechnik 135, no. 3 (2018): 249. http://dx.doi.org/10.1007/s00502-018-0619-2.
Full textObaidat, Mohammad S., Petros Nicopolitidis, and Weili Han. "Security of e-systems." Security and Communication Networks 7, no. 2 (2013): 322–24. http://dx.doi.org/10.1002/sec.897.
Full textBolun, Ion, and Arina Alexei. "Aspects of Securing Biomedical Informatics Networks and Systems." Economica, no. 4(130) (January 2025): 60–75. https://doi.org/10.53486/econ.2024.130.060.
Full textMalikovich, Karimov Madjit. "Random Number Generation in Operating Systems." American Journal of Applied Science and Technology 5, no. 5 (2025): 74–81. https://doi.org/10.37547/ajast/volume05issue05-17.
Full textChangchit, Chuleeporn. "Security Systems Framework, Security-Related Research, Web Threats." Journal of Information Privacy and Security 7, no. 4 (2011): 1–2. http://dx.doi.org/10.1080/15536548.2011.10855920.
Full text