Academic literature on the topic 'Security and control systems'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security and control systems.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Security and control systems"

1

Hayashi, Kentaro. "Cyber-Security Controls for Industrial Control Systems." JAPAN TAPPI JOURNAL 68, no. 3 (2014): 275–80. http://dx.doi.org/10.2524/jtappij.68.275.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

GAZDA, Karol. "SECURITY OF INDUSTRIAL CONTROL SYSTEMS." Cybersecurity & Cybercrime 1, no. 1 (2021): 75–82. http://dx.doi.org/10.5604/01.3001.0053.8011.

Full text
Abstract:
The study presents a number of elements of the Industrial Control System infrastructurealong with an overview of the concept of ensuring their security while listing cyberthreats with recommendations to mitigate them.
APA, Harvard, Vancouver, ISO, and other styles
3

Hentea, Mariana. "Improving Security for SCADA Control Systems." Interdisciplinary Journal of Information, Knowledge, and Management 3 (2008): 073–86. http://dx.doi.org/10.28945/91.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

FUJITA, Shintaro, and Kenji SAWADA. "Security Measures Technology for Control Systems." Journal of The Institute of Electrical Engineers of Japan 142, no. 4 (2022): 212–14. http://dx.doi.org/10.1541/ieejjournal.142.212.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Amrein, A., V. Angeletti, A. Beitler, et al. "Security intelligence for industrial control systems." IBM Journal of Research and Development 60, no. 4 (2016): 13:1–13:12. http://dx.doi.org/10.1147/jrd.2016.2575698.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Karnasuta, K., C. Treewittayapoom, and A. Tiranuchit. "Security Control of Small Longitudinal Systems." IFAC Proceedings Volumes 22, no. 9 (1989): 61–65. http://dx.doi.org/10.1016/s1474-6670(17)53246-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Miller, A. "Trends in Process Control Systems Security." IEEE Security and Privacy Magazine 3, no. 5 (2005): 57–60. http://dx.doi.org/10.1109/msp.2005.136.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Thopate, Kaushalya, Sandip Shinde, Rupali Mahajan, et al. "Keyless Security." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 8s (2023): 170–74. http://dx.doi.org/10.17762/ijritcc.v11i8s.7187.

Full text
Abstract:
This research paper introduces a novel approach to improve security and access control in smart door lock systems. The proposed system incorporates multi-factor authentication, combining a numerical keypad, mobile app, and RFID sensor. Each authentication method is associated with a specific lock, offering differentiated access control. Notably, the system requires the simultaneous use of the mobile app and RFID sensor to unlock a designated lock, adding an extra layer of security. To assess the system's effectiveness, a comprehensive study was conducted, considering security, usability, and u
APA, Harvard, Vancouver, ISO, and other styles
9

Pretorius, Barend, and Brett van Niekerk. "Cyber-Security for ICS/SCADA." International Journal of Cyber Warfare and Terrorism 6, no. 3 (2016): 1–16. http://dx.doi.org/10.4018/ijcwt.2016070101.

Full text
Abstract:
Industrial control systems (ICS) or supervisory, control, and data acquisition (SCADA) systems drive many key components of the national infrastructure. It makes these control systems targets for cyber-attacks by terrorists and nation-states who wish to damage their target economically and socially, and cyber-criminals who blackmail the companies operating the infrastructure. Despite the high risk of leaving these systems exposed, providing adequate cyber-security is often challenging. The Stuxnet worm illustrated how vulnerable control systems potentially are when it bypassed a number of secu
APA, Harvard, Vancouver, ISO, and other styles
10

Kim, Jaewon, and P. R. Kumar. "Security of Control Systems with Erroneous Observations." IFAC-PapersOnLine 53, no. 2 (2020): 2225–30. http://dx.doi.org/10.1016/j.ifacol.2020.12.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Security and control systems"

1

Szostak, Rafal. "Security in process control systems." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9903.

Full text
Abstract:
<p>PCS are used to control parts of the critical infrastructure of society, such as electric utilities, petroleum , water, waste, chemicals and pharmaceuticals amongst others. If the PCS become victims of cyber attacks, this can have severe consequences. The consequences may involve health and safety of human lives as well as having a huge impact on national and global economy. Since the merging of COTS and PCS, the previously isolated PCS now face new types of threats due to well-known flaws in COTS, as well as being connected to the Internet. Therefore the focus on securing PCS and ICS in ge
APA, Harvard, Vancouver, ISO, and other styles
2

Dawson, Robert Edward. "Secure communications for critical infrastructure control systems." Thesis, Queensland University of Technology, 2008. https://eprints.qut.edu.au/20710/1/Robert_Dawson_Thesis.pdf.

Full text
Abstract:
In March 2000, 1 million litres of raw sewage was released into the water system of Maroochy Shire on Queensland’s sunshine coast. This environmental disaster was caused by a disgruntled ex-contractor using a radio transmitter to illicitly access the electronically controlled pumps in the control system. In 2007 CNN screened video footage of an experimental attack against a electrical generator. The attack caused the generator to shake and smoke, visually showing the damage caused by cyber attack. These attacks highlight the importance of securing the control systems which our critical infrast
APA, Harvard, Vancouver, ISO, and other styles
3

Dawson, Robert Edward. "Secure communications for critical infrastructure control systems." Queensland University of Technology, 2008. http://eprints.qut.edu.au/20710/.

Full text
Abstract:
In March 2000, 1 million litres of raw sewage was released into the water system of Maroochy Shire on Queensland’s sunshine coast. This environmental disaster was caused by a disgruntled ex-contractor using a radio transmitter to illicitly access the electronically controlled pumps in the control system. In 2007 CNN screened video footage of an experimental attack against a electrical generator. The attack caused the generator to shake and smoke, visually showing the damage caused by cyber attack. These attacks highlight the importance of securing the control systems which our critical infrast
APA, Harvard, Vancouver, ISO, and other styles
4

Shafie-Pour, A. R. "Real-time power system security assessment." Thesis, Durham University, 1989. http://etheses.dur.ac.uk/9303/.

Full text
Abstract:
The increasing complexity of modern power systems has led to a greater dependence on automatic control at all levels of operation. Large scale systems of which a power system is a prime example, is an area in which a wide gap exists between theoretical mathematically based research and engineering practice. The research programme at Durham is directed towards bridging this gap by linking some of the available and new theoretical techniques with the practical requirements of on-line computer control in power systems. This thesis is concerned with the assessment of security of power systems in r
APA, Harvard, Vancouver, ISO, and other styles
5

Åkerberg, Johan. "On Security in Safety-Critical Process Control." Licentiate thesis, Mälardalen University, School of Innovation, Design and Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-7334.

Full text
Abstract:
<p>This Licentiate thesis is about security in automation networks with emphasis on fieldbus communication. In the process industry, network and system security have become even more important since the introduction of Ethernet-based fieldbus protocols. As an example, a successful attack on a power plant, supporting large cities with energy, could result in a temporal but total power loss. Such attacks could be devastating for the society. The security threats are real, and motivations for attacking industrial communication systems may be political or economical.</p><p>The visions of autonomou
APA, Harvard, Vancouver, ISO, and other styles
6

Cote, James W. "Voltage security assessment and control in electric power systems /." Thesis, Connect to this title online; UW restricted, 1992. http://hdl.handle.net/1773/5925.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chehrazi, Golriz. "Workflow management systems, their security and access control mechanisms." Thesis, Linköping University, Department of Electrical Engineering, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-15933.

Full text
Abstract:
<p>This paper gives an overview of workflow management systems (WfMSs) and their security requirements with focus on access mechanisms. It is a descriptive paper in which we examine the state of the art of workflow systems, describe what security risks affect WfMSs in particular, and how these can be diminiuished.</p><p>WfMSs manage, illustrate and support business processes. They contribute to the performance, automation and optimization of processes, which is important in the global economy today. The security of process flows is important, since the sensitive business data need to be prote
APA, Harvard, Vancouver, ISO, and other styles
8

Eriksson, Robert. "Security-centered Coordinated Control in AC/DC Transmission Systems." Licentiate thesis, Stockholm : Royal Institute of Technology, 2008. http://kth.diva-portal.org/smash/record.jsf?searchId=4&pid=diva2:101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sajjad, Imran. "Autonomous Highway Systems Safety and Security." DigitalCommons@USU, 2017. https://digitalcommons.usu.edu/etd/5696.

Full text
Abstract:
Automated vehicles are getting closer each day to large-scale deployment. It is expected that self-driving cars will be able to alleviate traffic congestion by safely operating at distances closer than human drivers are capable of and will overall improve traffic throughput. In these conditions, passenger safety and security is of utmost importance. When multiple autonomous cars follow each other on a highway, they will form what is known as a cyber-physical system. In a general setting, there are tools to assess the level of influence a possible attacker can have on such a system, which then
APA, Harvard, Vancouver, ISO, and other styles
10

Kvist, Johan. "Security and Control System for fluid in a tank." Thesis, Jönköping University, JTH, Computer and Electrical Engineering, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-1011.

Full text
Abstract:
<p>This rapport describes how a security and control system has been developed for moveable diesel tanks. Enormous amounts of diesel in Sweden are stolen every year and the tank that is most vulnerable is the moveable tank in other words tanks that can be moved around with diesel inside.</p><p>The report proposes methods how to measure fluid amount in a tank and how to measure if diesel is disappearing from the tank.</p><p>The report also describes a tank monitoring system prototype.</p>
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Security and control systems"

1

Ishii, Hideaki, and Quanyan Zhu, eds. Security and Resilience of Control Systems. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-83236-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rieger, Craig, Indrajit Ray, Quanyan Zhu, and Michael A. Haney, eds. Industrial Control Systems Security and Resiliency. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-18214-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Radvanovsky, Robert, and Jacob Brodsky. Handbook of SCADA/control systems security. CRC Press, Taylor & Francis Group, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Radvanovsky, Robert. Handbook of SCADA/control systems security. CRC Press, Taylor & Francis Group, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dominic, Fenn, and Key Note Publications, eds. Access control. 2nd ed. Key Note, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bowers, Dan M. Access control and personal identification systems. Butterworths, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bécue, Adrien, Nora Cuppens-Boulahia, Frédéric Cuppens, Sokratis Katsikas, and Costas Lambrinoudakis, eds. Security of Industrial Control Systems and Cyber Physical Systems. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-40385-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Cuppens-Boulahia, Nora, Costas Lambrinoudakis, Frédéric Cuppens, and Sokratis Katsikas, eds. Security of Industrial Control Systems and Cyber-Physical Systems. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-61437-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

O'Shea, G. Security in computer operating systems. NCC Blackwell, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Fites, Philip E. Control and security of computer information systems. Computer Science Press, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Security and control systems"

1

Campbell, Tony. "Industrial Control Systems." In Practical Information Security Management. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1685-9_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Coggins, Caleb S., and Diane E. Levine. "Monitoring and Control Systems." In Computer Security Handbook. John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781118820650.ch53.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Naldurg, Prasad. "Foundations of Dynamic Access Control." In Information Systems Security. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35130-3_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kühnhauser, Winfried E., and Anja Pölck. "Towards Access Control Model Engineering." In Information Systems Security. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25560-1_27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Masoumzadeh, Amir Reza, Morteza Amini, and Rasool Jalili. "Context-Aware Provisional Access Control." In Information Systems Security. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11961635_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yang, Shuang-Hua. "Safety and Security Checking." In Internet-based Control Systems. Springer London, 2011. http://dx.doi.org/10.1007/978-1-84996-359-6_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Majumdar, Anirban, Clark Thomborson, and Stephen Drape. "A Survey of Control-Flow Obfuscations." In Information Systems Security. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11961635_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Davari, Maryam, and Mohammad Zulkernine. "Mining Attribute-Based Access Control Policies." In Information Systems Security. Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-23690-7_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sandberg, Henrik. "Cyber-Physical Security." In Encyclopedia of Systems and Control. Springer London, 2020. http://dx.doi.org/10.1007/978-1-4471-5102-9_100112-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sandberg, Henrik. "Cyber-Physical Security." In Encyclopedia of Systems and Control. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-44184-5_100112.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Security and control systems"

1

Denes, Istvan, and Sándor Semperger. "Improvement of Physical Security through Continuous Authentication for SCADA and DCS Systems in Industrial Automation and Control Systems." In 10th International Scientific Conference on Advances in Mechanical Engineering. Trans Tech Publications Ltd, 2025. https://doi.org/10.4028/p-nl1llk.

Full text
Abstract:
As the treat landscape in Operational Technology (OT) cyber security is getting more complicated, there is a general demand in most industries to increase the Target Security Level (SL-T) of Industry Automation and Control Systems (IACS). More sophisticated treat actors with higher motivation are on stage, and treat actors are getting increasingly familiar with IACS. Yet some security controls, widely used in Information Technology, are often hard to implement in IACS. Inability to go away from obsolete Operational System (OS), using shared accounts for operators, limited applicability of secu
APA, Harvard, Vancouver, ISO, and other styles
2

G, Thamarai Selvi, Vishwa B, Vishwanath R, and Ramprasath NT. "Comprehensive Security Systems for Fishermen." In 2024 International Conference on Power, Energy, Control and Transmission Systems (ICPECTS). IEEE, 2024. https://doi.org/10.1109/icpects62210.2024.10780385.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mierau, Thomas. "Remote Monitoring & Control Systems as a Solution for Corrosion Monitoring at Airports with Elevated Security Standards." In CORROSION 2006. NACE International, 2006. https://doi.org/10.5006/c2006-06309.

Full text
Abstract:
Abstract The new security standards at International Airports have made the acquisition of corrosion data and the administration of corrosion problem solving on airport facilities, extremely complicated. In todays post 9-11 environment, Corrosion Engineers are confronted with the necessity of obtaining special ID’s, acquiring special security permits and being accompanied by security escorts or authorized personal from the Airport at all times. This daily procedure magnifies cost dramatically. With the emergence of the new powerful microprocessors, a low cost PC based Remote Monitoring and Con
APA, Harvard, Vancouver, ISO, and other styles
4

Fransen, Ruben, Marijn v. Adrichem, Hannah Onverwagt, and Hanno Hildmann. "Self-organizing control for unmanned ground vehicles." In Autonomous Systems for Security and Defence, edited by Judith Dijk and Jose Luis Sanchez-Lopez. SPIE, 2024. http://dx.doi.org/10.1117/12.3033891.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hentea, Mariana. "Improving Security for SCADA Control Systems." In InSITE 2008: Informing Science + IT Education Conference. Informing Science Institute, 2008. http://dx.doi.org/10.28945/3185.

Full text
Abstract:
The continuous growth of cyber security threats and attacks including the increasing sophistication of malware is impacting the security of critical infrastructure, industrial control systems, and Supervisory Control and Data Acquisition (SCADA) control systems. The reliable operation of modern infrastructures depends on computerized systems and SCADA systems. Since the emergence of Internet and World Wide Web technologies, these systems were integrated with business systems and became more exposed to cyber threats. There is a growing concern about the security and safety of the SCADA control
APA, Harvard, Vancouver, ISO, and other styles
6

Cao, Jun, Yi Liu, Y. Ge, Hui Cai, and B. W. Zhou. "Enhanced corrective security constrained OPF with hybrid energy storage systems." In 2016 UKACC 11th International Conference on Control (CONTROL). IEEE, 2016. http://dx.doi.org/10.1109/control.2016.7737584.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hu, Liang, Zidong Wang, and Wasif Naeem. "Security analysis of stochastic networked control systems under false data injection attacks." In 2016 UKACC 11th International Conference on Control (CONTROL). IEEE, 2016. http://dx.doi.org/10.1109/control.2016.7737519.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jie, Peng, and Liu Li. "Industrial Control System Security." In 2011 International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC). IEEE, 2011. http://dx.doi.org/10.1109/ihmsc.2011.108.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ikonnikov, S. E., A. E. Ermakova, and O. O. Nuzhdin. "THE FEATURES OF INFORMATION SECURITY TOOLS CENTRALIZED CONTROL." In Intelligent transport systems. Russian University of Transport, 2024. http://dx.doi.org/10.30932/9785002446094-2024-579-583.

Full text
Abstract:
This article examines the indicators that are used to assess the state of information security in an organization. Modern problems related to the centralized management of information security tools were also identified. Based on these problems, the requirements for the Information Security Management Center were determined, as well as the functions that the central information security management body should perform. It is concluded that effective management of information security tools should be based on secure software development and the use of internal hardware and software complexes to
APA, Harvard, Vancouver, ISO, and other styles
10

Lifeng Lai, Siu-Wai Ho, and H. Vincent Poor. "Privacy-security tradeoffs in biometric security systems." In 2008 46th Annual Allerton Conference on Communication, Control, and Computing. IEEE, 2008. http://dx.doi.org/10.1109/allerton.2008.4797566.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Security and control systems"

1

Robert P. Evans. Control Systems Security Center Comparison Study of Industrial Control System Standards against the Control Systems Protection Framework Cyber-Security Requirements. Office of Scientific and Technical Information (OSTI), 2005. http://dx.doi.org/10.2172/911771.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Falco, J., K. Stouffer, A. Wavering, and F. Proctor. IT security for industrial control systems. National Institute of Standards and Technology, 2002. http://dx.doi.org/10.6028/nist.ir.6859.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Robert Evans. Control Systems Cyber Security Standards Support Activities. Office of Scientific and Technical Information (OSTI), 2009. http://dx.doi.org/10.2172/950989.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Stouffer, K. A., J. A. Falco, and K. A. Scarfone. Guide to Industrial control Systems (ICS) security :. National Institute of Standards and Technology, 2008. http://dx.doi.org/10.6028/nist.sp.800-82e2008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Stouffer, Keith, Victoria Pillitteri, Suzanne Lightman, Marshall Abrams, and Adam Hahn. Guide to Industrial Control Systems (ICS) Security. National Institute of Standards and Technology, 2015. http://dx.doi.org/10.6028/nist.sp.800-82r2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Robert E. Polk and Alen M. Snyder. Control Systems Security Test Center - FY 2004 Program Summary. Office of Scientific and Technical Information (OSTI), 2005. http://dx.doi.org/10.2172/911797.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dawson, Lon Andrew, Christopher Lamb, and Armida J. Carbajal. Industrial Control Systems Cyber Security Risk Candidate Methods Analysis. Office of Scientific and Technical Information (OSTI), 2018. http://dx.doi.org/10.2172/1463794.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Stouffer, Keith, Joe Falco, and Karen Scarfone. Guide to Industrial Control Systems (ICS) Security : Supervisory Control and Data Acquisition (SCADA) Systems, Distributed Control Systems (DCS), and Other Control System Configurations such as Programmable Logic Controllers (PLC). National Institute of Standards and Technology, 2013. http://dx.doi.org/10.6028/nist.sp.800-82r1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Stouffer, Keith, Joe Falco, and Karen Scarfone. Guide to Industrial Control Systems (ICS) Security - Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC). National Institute of Standards and Technology, 2011. http://dx.doi.org/10.6028/nist.sp.800.82.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Stouffer, Keith, Joe Falco, and Karen Scarfone. Guide to Industrial Control Systems (ICS) security : Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC) : recommendations of the National Institute of Standards and Technology, Computer security. National Institute of Standards and Technology, 2011. http://dx.doi.org/10.6028/nist.sp.800-82.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!