Academic literature on the topic 'Security and control systems'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security and control systems.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security and control systems"
Hayashi, Kentaro. "Cyber-Security Controls for Industrial Control Systems." JAPAN TAPPI JOURNAL 68, no. 3 (2014): 275–80. http://dx.doi.org/10.2524/jtappij.68.275.
Full textGAZDA, Karol. "SECURITY OF INDUSTRIAL CONTROL SYSTEMS." Cybersecurity & Cybercrime 1, no. 1 (2021): 75–82. http://dx.doi.org/10.5604/01.3001.0053.8011.
Full textHentea, Mariana. "Improving Security for SCADA Control Systems." Interdisciplinary Journal of Information, Knowledge, and Management 3 (2008): 073–86. http://dx.doi.org/10.28945/91.
Full textFUJITA, Shintaro, and Kenji SAWADA. "Security Measures Technology for Control Systems." Journal of The Institute of Electrical Engineers of Japan 142, no. 4 (2022): 212–14. http://dx.doi.org/10.1541/ieejjournal.142.212.
Full textAmrein, A., V. Angeletti, A. Beitler, et al. "Security intelligence for industrial control systems." IBM Journal of Research and Development 60, no. 4 (2016): 13:1–13:12. http://dx.doi.org/10.1147/jrd.2016.2575698.
Full textKarnasuta, K., C. Treewittayapoom, and A. Tiranuchit. "Security Control of Small Longitudinal Systems." IFAC Proceedings Volumes 22, no. 9 (1989): 61–65. http://dx.doi.org/10.1016/s1474-6670(17)53246-2.
Full textMiller, A. "Trends in Process Control Systems Security." IEEE Security and Privacy Magazine 3, no. 5 (2005): 57–60. http://dx.doi.org/10.1109/msp.2005.136.
Full textThopate, Kaushalya, Sandip Shinde, Rupali Mahajan, et al. "Keyless Security." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 8s (2023): 170–74. http://dx.doi.org/10.17762/ijritcc.v11i8s.7187.
Full textPretorius, Barend, and Brett van Niekerk. "Cyber-Security for ICS/SCADA." International Journal of Cyber Warfare and Terrorism 6, no. 3 (2016): 1–16. http://dx.doi.org/10.4018/ijcwt.2016070101.
Full textKim, Jaewon, and P. R. Kumar. "Security of Control Systems with Erroneous Observations." IFAC-PapersOnLine 53, no. 2 (2020): 2225–30. http://dx.doi.org/10.1016/j.ifacol.2020.12.008.
Full textDissertations / Theses on the topic "Security and control systems"
Szostak, Rafal. "Security in process control systems." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9903.
Full textDawson, Robert Edward. "Secure communications for critical infrastructure control systems." Thesis, Queensland University of Technology, 2008. https://eprints.qut.edu.au/20710/1/Robert_Dawson_Thesis.pdf.
Full textDawson, Robert Edward. "Secure communications for critical infrastructure control systems." Queensland University of Technology, 2008. http://eprints.qut.edu.au/20710/.
Full textShafie-Pour, A. R. "Real-time power system security assessment." Thesis, Durham University, 1989. http://etheses.dur.ac.uk/9303/.
Full textÅkerberg, Johan. "On Security in Safety-Critical Process Control." Licentiate thesis, Mälardalen University, School of Innovation, Design and Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-7334.
Full textCote, James W. "Voltage security assessment and control in electric power systems /." Thesis, Connect to this title online; UW restricted, 1992. http://hdl.handle.net/1773/5925.
Full textChehrazi, Golriz. "Workflow management systems, their security and access control mechanisms." Thesis, Linköping University, Department of Electrical Engineering, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-15933.
Full textEriksson, Robert. "Security-centered Coordinated Control in AC/DC Transmission Systems." Licentiate thesis, Stockholm : Royal Institute of Technology, 2008. http://kth.diva-portal.org/smash/record.jsf?searchId=4&pid=diva2:101.
Full textSajjad, Imran. "Autonomous Highway Systems Safety and Security." DigitalCommons@USU, 2017. https://digitalcommons.usu.edu/etd/5696.
Full textKvist, Johan. "Security and Control System for fluid in a tank." Thesis, Jönköping University, JTH, Computer and Electrical Engineering, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-1011.
Full textBooks on the topic "Security and control systems"
Ishii, Hideaki, and Quanyan Zhu, eds. Security and Resilience of Control Systems. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-83236-0.
Full textRieger, Craig, Indrajit Ray, Quanyan Zhu, and Michael A. Haney, eds. Industrial Control Systems Security and Resiliency. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-18214-4.
Full textRadvanovsky, Robert, and Jacob Brodsky. Handbook of SCADA/control systems security. CRC Press, Taylor & Francis Group, 2016.
Find full textRadvanovsky, Robert. Handbook of SCADA/control systems security. CRC Press, Taylor & Francis Group, 2013.
Find full textDominic, Fenn, and Key Note Publications, eds. Access control. 2nd ed. Key Note, 1999.
Find full textBowers, Dan M. Access control and personal identification systems. Butterworths, 1988.
Find full textBécue, Adrien, Nora Cuppens-Boulahia, Frédéric Cuppens, Sokratis Katsikas, and Costas Lambrinoudakis, eds. Security of Industrial Control Systems and Cyber Physical Systems. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-40385-4.
Full textCuppens-Boulahia, Nora, Costas Lambrinoudakis, Frédéric Cuppens, and Sokratis Katsikas, eds. Security of Industrial Control Systems and Cyber-Physical Systems. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-61437-3.
Full textFites, Philip E. Control and security of computer information systems. Computer Science Press, 1989.
Find full textBook chapters on the topic "Security and control systems"
Campbell, Tony. "Industrial Control Systems." In Practical Information Security Management. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1685-9_13.
Full textCoggins, Caleb S., and Diane E. Levine. "Monitoring and Control Systems." In Computer Security Handbook. John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781118820650.ch53.
Full textNaldurg, Prasad. "Foundations of Dynamic Access Control." In Information Systems Security. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35130-3_4.
Full textKühnhauser, Winfried E., and Anja Pölck. "Towards Access Control Model Engineering." In Information Systems Security. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25560-1_27.
Full textMasoumzadeh, Amir Reza, Morteza Amini, and Rasool Jalili. "Context-Aware Provisional Access Control." In Information Systems Security. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11961635_9.
Full textYang, Shuang-Hua. "Safety and Security Checking." In Internet-based Control Systems. Springer London, 2011. http://dx.doi.org/10.1007/978-1-84996-359-6_10.
Full textMajumdar, Anirban, Clark Thomborson, and Stephen Drape. "A Survey of Control-Flow Obfuscations." In Information Systems Security. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11961635_26.
Full textDavari, Maryam, and Mohammad Zulkernine. "Mining Attribute-Based Access Control Policies." In Information Systems Security. Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-23690-7_11.
Full textSandberg, Henrik. "Cyber-Physical Security." In Encyclopedia of Systems and Control. Springer London, 2020. http://dx.doi.org/10.1007/978-1-4471-5102-9_100112-1.
Full textSandberg, Henrik. "Cyber-Physical Security." In Encyclopedia of Systems and Control. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-44184-5_100112.
Full textConference papers on the topic "Security and control systems"
Denes, Istvan, and Sándor Semperger. "Improvement of Physical Security through Continuous Authentication for SCADA and DCS Systems in Industrial Automation and Control Systems." In 10th International Scientific Conference on Advances in Mechanical Engineering. Trans Tech Publications Ltd, 2025. https://doi.org/10.4028/p-nl1llk.
Full textG, Thamarai Selvi, Vishwa B, Vishwanath R, and Ramprasath NT. "Comprehensive Security Systems for Fishermen." In 2024 International Conference on Power, Energy, Control and Transmission Systems (ICPECTS). IEEE, 2024. https://doi.org/10.1109/icpects62210.2024.10780385.
Full textMierau, Thomas. "Remote Monitoring & Control Systems as a Solution for Corrosion Monitoring at Airports with Elevated Security Standards." In CORROSION 2006. NACE International, 2006. https://doi.org/10.5006/c2006-06309.
Full textFransen, Ruben, Marijn v. Adrichem, Hannah Onverwagt, and Hanno Hildmann. "Self-organizing control for unmanned ground vehicles." In Autonomous Systems for Security and Defence, edited by Judith Dijk and Jose Luis Sanchez-Lopez. SPIE, 2024. http://dx.doi.org/10.1117/12.3033891.
Full textHentea, Mariana. "Improving Security for SCADA Control Systems." In InSITE 2008: Informing Science + IT Education Conference. Informing Science Institute, 2008. http://dx.doi.org/10.28945/3185.
Full textCao, Jun, Yi Liu, Y. Ge, Hui Cai, and B. W. Zhou. "Enhanced corrective security constrained OPF with hybrid energy storage systems." In 2016 UKACC 11th International Conference on Control (CONTROL). IEEE, 2016. http://dx.doi.org/10.1109/control.2016.7737584.
Full textHu, Liang, Zidong Wang, and Wasif Naeem. "Security analysis of stochastic networked control systems under false data injection attacks." In 2016 UKACC 11th International Conference on Control (CONTROL). IEEE, 2016. http://dx.doi.org/10.1109/control.2016.7737519.
Full textJie, Peng, and Liu Li. "Industrial Control System Security." In 2011 International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC). IEEE, 2011. http://dx.doi.org/10.1109/ihmsc.2011.108.
Full textIkonnikov, S. E., A. E. Ermakova, and O. O. Nuzhdin. "THE FEATURES OF INFORMATION SECURITY TOOLS CENTRALIZED CONTROL." In Intelligent transport systems. Russian University of Transport, 2024. http://dx.doi.org/10.30932/9785002446094-2024-579-583.
Full textLifeng Lai, Siu-Wai Ho, and H. Vincent Poor. "Privacy-security tradeoffs in biometric security systems." In 2008 46th Annual Allerton Conference on Communication, Control, and Computing. IEEE, 2008. http://dx.doi.org/10.1109/allerton.2008.4797566.
Full textReports on the topic "Security and control systems"
Robert P. Evans. Control Systems Security Center Comparison Study of Industrial Control System Standards against the Control Systems Protection Framework Cyber-Security Requirements. Office of Scientific and Technical Information (OSTI), 2005. http://dx.doi.org/10.2172/911771.
Full textFalco, J., K. Stouffer, A. Wavering, and F. Proctor. IT security for industrial control systems. National Institute of Standards and Technology, 2002. http://dx.doi.org/10.6028/nist.ir.6859.
Full textRobert Evans. Control Systems Cyber Security Standards Support Activities. Office of Scientific and Technical Information (OSTI), 2009. http://dx.doi.org/10.2172/950989.
Full textStouffer, K. A., J. A. Falco, and K. A. Scarfone. Guide to Industrial control Systems (ICS) security :. National Institute of Standards and Technology, 2008. http://dx.doi.org/10.6028/nist.sp.800-82e2008.
Full textStouffer, Keith, Victoria Pillitteri, Suzanne Lightman, Marshall Abrams, and Adam Hahn. Guide to Industrial Control Systems (ICS) Security. National Institute of Standards and Technology, 2015. http://dx.doi.org/10.6028/nist.sp.800-82r2.
Full textRobert E. Polk and Alen M. Snyder. Control Systems Security Test Center - FY 2004 Program Summary. Office of Scientific and Technical Information (OSTI), 2005. http://dx.doi.org/10.2172/911797.
Full textDawson, Lon Andrew, Christopher Lamb, and Armida J. Carbajal. Industrial Control Systems Cyber Security Risk Candidate Methods Analysis. Office of Scientific and Technical Information (OSTI), 2018. http://dx.doi.org/10.2172/1463794.
Full textStouffer, Keith, Joe Falco, and Karen Scarfone. Guide to Industrial Control Systems (ICS) Security : Supervisory Control and Data Acquisition (SCADA) Systems, Distributed Control Systems (DCS), and Other Control System Configurations such as Programmable Logic Controllers (PLC). National Institute of Standards and Technology, 2013. http://dx.doi.org/10.6028/nist.sp.800-82r1.
Full textStouffer, Keith, Joe Falco, and Karen Scarfone. Guide to Industrial Control Systems (ICS) Security - Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC). National Institute of Standards and Technology, 2011. http://dx.doi.org/10.6028/nist.sp.800.82.
Full textStouffer, Keith, Joe Falco, and Karen Scarfone. Guide to Industrial Control Systems (ICS) security : Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC) : recommendations of the National Institute of Standards and Technology, Computer security. National Institute of Standards and Technology, 2011. http://dx.doi.org/10.6028/nist.sp.800-82.
Full text