To see the other types of publications on this topic, follow the link: Security and control systems.

Dissertations / Theses on the topic 'Security and control systems'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Security and control systems.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Szostak, Rafal. "Security in process control systems." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9903.

Full text
Abstract:
<p>PCS are used to control parts of the critical infrastructure of society, such as electric utilities, petroleum , water, waste, chemicals and pharmaceuticals amongst others. If the PCS become victims of cyber attacks, this can have severe consequences. The consequences may involve health and safety of human lives as well as having a huge impact on national and global economy. Since the merging of COTS and PCS, the previously isolated PCS now face new types of threats due to well-known flaws in COTS, as well as being connected to the Internet. Therefore the focus on securing PCS and ICS in ge
APA, Harvard, Vancouver, ISO, and other styles
2

Dawson, Robert Edward. "Secure communications for critical infrastructure control systems." Thesis, Queensland University of Technology, 2008. https://eprints.qut.edu.au/20710/1/Robert_Dawson_Thesis.pdf.

Full text
Abstract:
In March 2000, 1 million litres of raw sewage was released into the water system of Maroochy Shire on Queensland’s sunshine coast. This environmental disaster was caused by a disgruntled ex-contractor using a radio transmitter to illicitly access the electronically controlled pumps in the control system. In 2007 CNN screened video footage of an experimental attack against a electrical generator. The attack caused the generator to shake and smoke, visually showing the damage caused by cyber attack. These attacks highlight the importance of securing the control systems which our critical infrast
APA, Harvard, Vancouver, ISO, and other styles
3

Dawson, Robert Edward. "Secure communications for critical infrastructure control systems." Queensland University of Technology, 2008. http://eprints.qut.edu.au/20710/.

Full text
Abstract:
In March 2000, 1 million litres of raw sewage was released into the water system of Maroochy Shire on Queensland’s sunshine coast. This environmental disaster was caused by a disgruntled ex-contractor using a radio transmitter to illicitly access the electronically controlled pumps in the control system. In 2007 CNN screened video footage of an experimental attack against a electrical generator. The attack caused the generator to shake and smoke, visually showing the damage caused by cyber attack. These attacks highlight the importance of securing the control systems which our critical infrast
APA, Harvard, Vancouver, ISO, and other styles
4

Shafie-Pour, A. R. "Real-time power system security assessment." Thesis, Durham University, 1989. http://etheses.dur.ac.uk/9303/.

Full text
Abstract:
The increasing complexity of modern power systems has led to a greater dependence on automatic control at all levels of operation. Large scale systems of which a power system is a prime example, is an area in which a wide gap exists between theoretical mathematically based research and engineering practice. The research programme at Durham is directed towards bridging this gap by linking some of the available and new theoretical techniques with the practical requirements of on-line computer control in power systems. This thesis is concerned with the assessment of security of power systems in r
APA, Harvard, Vancouver, ISO, and other styles
5

Åkerberg, Johan. "On Security in Safety-Critical Process Control." Licentiate thesis, Mälardalen University, School of Innovation, Design and Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-7334.

Full text
Abstract:
<p>This Licentiate thesis is about security in automation networks with emphasis on fieldbus communication. In the process industry, network and system security have become even more important since the introduction of Ethernet-based fieldbus protocols. As an example, a successful attack on a power plant, supporting large cities with energy, could result in a temporal but total power loss. Such attacks could be devastating for the society. The security threats are real, and motivations for attacking industrial communication systems may be political or economical.</p><p>The visions of autonomou
APA, Harvard, Vancouver, ISO, and other styles
6

Cote, James W. "Voltage security assessment and control in electric power systems /." Thesis, Connect to this title online; UW restricted, 1992. http://hdl.handle.net/1773/5925.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chehrazi, Golriz. "Workflow management systems, their security and access control mechanisms." Thesis, Linköping University, Department of Electrical Engineering, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-15933.

Full text
Abstract:
<p>This paper gives an overview of workflow management systems (WfMSs) and their security requirements with focus on access mechanisms. It is a descriptive paper in which we examine the state of the art of workflow systems, describe what security risks affect WfMSs in particular, and how these can be diminiuished.</p><p>WfMSs manage, illustrate and support business processes. They contribute to the performance, automation and optimization of processes, which is important in the global economy today. The security of process flows is important, since the sensitive business data need to be prote
APA, Harvard, Vancouver, ISO, and other styles
8

Eriksson, Robert. "Security-centered Coordinated Control in AC/DC Transmission Systems." Licentiate thesis, Stockholm : Royal Institute of Technology, 2008. http://kth.diva-portal.org/smash/record.jsf?searchId=4&pid=diva2:101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sajjad, Imran. "Autonomous Highway Systems Safety and Security." DigitalCommons@USU, 2017. https://digitalcommons.usu.edu/etd/5696.

Full text
Abstract:
Automated vehicles are getting closer each day to large-scale deployment. It is expected that self-driving cars will be able to alleviate traffic congestion by safely operating at distances closer than human drivers are capable of and will overall improve traffic throughput. In these conditions, passenger safety and security is of utmost importance. When multiple autonomous cars follow each other on a highway, they will form what is known as a cyber-physical system. In a general setting, there are tools to assess the level of influence a possible attacker can have on such a system, which then
APA, Harvard, Vancouver, ISO, and other styles
10

Kvist, Johan. "Security and Control System for fluid in a tank." Thesis, Jönköping University, JTH, Computer and Electrical Engineering, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-1011.

Full text
Abstract:
<p>This rapport describes how a security and control system has been developed for moveable diesel tanks. Enormous amounts of diesel in Sweden are stolen every year and the tank that is most vulnerable is the moveable tank in other words tanks that can be moved around with diesel inside.</p><p>The report proposes methods how to measure fluid amount in a tank and how to measure if diesel is disappearing from the tank.</p><p>The report also describes a tank monitoring system prototype.</p>
APA, Harvard, Vancouver, ISO, and other styles
11

Knowles, Carl William. "Assurance techniques for assessing security control efficacy : an industrial control systems case study." Thesis, Lancaster University, 2016. http://eprints.lancs.ac.uk/79962/.

Full text
Abstract:
This thesis establishes the “assurance technique” as the central mechanism through which we gather evidence to make claims of assurance about security. The use of such assurance techniques in the process of assessing Industrial Control System (ICS) environments is explored. In doing so it provides six key contributions to knowledge: (i) a state-of-the-art survey of ICS security research, which culminates in a framework for future research, of which the assessment of security control efficacy is one element; (ii) claims about the effectiveness and cost-effectiveness of 20 assurance techniques u
APA, Harvard, Vancouver, ISO, and other styles
12

Elhabashy, Ahmed Essam. "Quality Control Tools for Cyber-Physical Security of Production Systems." Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/86725.

Full text
Abstract:
With recent advancements in computer and network technologies, cyber-physical systems have become more susceptible to cyber-attacks; and production systems are no exception. Unlike traditional Information Technology (IT) systems, cyber-physical systems are not limited to attacks aimed at Intellectual Property (IP) theft, but also include attacks that maliciously affect the physical world. In manufacturing, such cyber-physical attacks can destroy equipment, force dimensional product changes, alter a product's mechanical characteristics, or endanger human lives. The manufacturing industry often
APA, Harvard, Vancouver, ISO, and other styles
13

Rhodes, Anthony William. "Distributed information systems security through extended role based access control." Thesis, Queensland University of Technology, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Ziemann, Ingvar. "Applications of Information Inequalities to Linear Systems : Adaptive Control and Security." Licentiate thesis, KTH, Reglerteknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-291203.

Full text
Abstract:
This thesis considers the application of information inequalities, Cramér-Rao type bounds, based on Fisher information, to linear systems. These tools are used to study the trade-offs between learning and performance in two application areas: adaptive control and control systems security. In the first part of the thesis, we study stochastic adaptive control of linear quadratic regulators (LQR). Here, information inequalities are used to derive instance-dependent  regret lower bounds. First, we consider a simplified version of LQR, a memoryless reference tracking model, and show how regret can
APA, Harvard, Vancouver, ISO, and other styles
15

Milosevic, Jezdimir. "Model Based Impact Analysis and Security Measure Allocation for Control Systems." Licentiate thesis, KTH, Reglerteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-223684.

Full text
Abstract:
Improvement of cyber-security of industrial control systems is of utmost importance for our society. It has been recognized that many security vulnerabilities can be found in these systems, which if exploited may lead to dire consequences. For instance, successful cyber-attacks against industrial control systems may cause loss of electricity, lead to shortage of drinkable water,or disrupt oil and gas production. Deploying security measures to protect industrial control systems may be costly.  Thus, it is expected that we would not be able to prevent all the security vulnerabilities that we fin
APA, Harvard, Vancouver, ISO, and other styles
16

Chung, Tak Shing. "An integrated approach incorporating dynamic and static security limits in optimum power dispatch." Thesis, University of Strathclyde, 1993. http://oleg.lib.strath.ac.uk:80/R/?func=dbin-jump-full&object_id=20375.

Full text
Abstract:
Optimum power dispatch is performed in a power system to determine the most economic power dispatch condition for a certain system loading. In this thesis the main focus is on the investigation of this problem and its improved application by including both dynamic security and static security limits in its solution. The aim is to develop an efficient and practical on-line method of optimum power dispatch with due regard to the necessary security requirements. A critical review of the current practices of security and optimization in power system operation shows that they are essential elements
APA, Harvard, Vancouver, ISO, and other styles
17

Perez, Huertas Daniel. "Cyber-Security and Safety Analysis of Interconnected Water Tank Control Systems." Thesis, KTH, Reglerteknik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-55972.

Full text
Abstract:
Over the last few years, wireless sensor networks have become an interesting tool for controlling processes. Their use in this field has significantly increased based on recent technological advances which permit higher computational power, smaller size and lower cost. This makes them very suitable for integration in large networks of hundreds of interconnected motes that work together being spread in huge areas. However, the wireless nature of these systems make them susceptible to remote attacks, for example by hackers. That is, the wireless devices can be externally manipulated to disturb t
APA, Harvard, Vancouver, ISO, and other styles
18

Sans, Thierry. "Beyond access control - specifying and deploying security policies in information systems." Télécom Bretagne, 2007. http://www.theses.fr/2007TELB0040.

Full text
Abstract:
Les services multimédia de type " streaming ", exigent classiquement des performances élevées du réseau (haut débit, faible taux d'erreur et délai bref), en contradiction avec les importantes contraintes que subissent les réseaux sans fil (bande passante limitée, canaux souvent bruités et états de réseau très changeants). Dans cette thèse, nous étudions l'hypothèse que cet environnement subissant des contraintes importantes exige des architectures spécifiques à l'application, plutôt que des architectures généralistes, afin d'augmenter l'efficacité d'utilisation des ressources du réseau. Plus p
APA, Harvard, Vancouver, ISO, and other styles
19

CARLETTI, CRISTINA, and CRISTINA CARLETTI. "Control systems to augment the confort and security of marine vessels." Doctoral thesis, Università Politecnica delle Marche, 2011. http://hdl.handle.net/11566/241917.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Wei, Jinpeng. "Improving operating systems security two case studies /." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/31849.

Full text
Abstract:
Thesis (Ph.D)--Computing, Georgia Institute of Technology, 2010.<br>Committee Chair: Pu, Calton; Committee Member: Ahamad, Mustaque; Committee Member: Blough, Douglas; Committee Member: Giffin, Jonathon; Committee Member: Li, Kang. Part of the SMARTech Electronic Thesis and Dissertation Collection.
APA, Harvard, Vancouver, ISO, and other styles
21

Benson, Glenn Stuart. "A formal protection model of security in distributed systems." Diss., Georgia Institute of Technology, 1989. http://hdl.handle.net/1853/12238.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Idrissi, Hind. "Contributions to the security of mobile agent systems." Thesis, La Rochelle, 2016. http://www.theses.fr/2016LAROS022/document.

Full text
Abstract:
Récemment, l’informatique distribuée a connu une grande évolution en raison de l’utilisation du paradigme des agents mobiles, doté d’innovantes capacités, au lieu du système client-serveur où les applications sont liées à des nœuds particuliers dans les réseaux. Ayant capturé l’intérêt des chercheurs et de l’industrie, les agents mobiles sont capables de migrer de manière autonome d’un nœud à un autre à travers le réseau, en transférant de leur code et leurs données, ce qui leur permet d’effectuer efficacement des calculs, de recueillir des informations et d’accomplir des tâches. Cependant, en
APA, Harvard, Vancouver, ISO, and other styles
23

Muniraj, Devaprakash. "On the Security and Reliability of Fixed-Wing Unmanned Aircraft Systems." Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/102702.

Full text
Abstract:
The focus of this dissertation is on developing novel methods and extending existing ones to improve the security and reliability of fixed-wing unmanned aircraft systems (UAS). Specifically, we focus on three strands of work: i) designing UAS controllers with performance guarantees using the robust control framework, ii) developing tools for detection and mitigation of physical-layer security threats in UAS, and iii) extending tools from compositional verification to design and verify complex systems such as UAS. Under the first category, we use the robust H-infinity control approach to desi
APA, Harvard, Vancouver, ISO, and other styles
24

Ardagna, C. A. "Privacy and security in distributed and pervasive systems." Doctoral thesis, Università degli Studi di Milano, 2008. http://hdl.handle.net/2434/55664.

Full text
Abstract:
Technical improvements of Web and location technologies have fostered the development of online applications that use private information of users to offer enhanced services. As a consequence, the vast amount of personal information thus available on the Web has led to growing concerns about privacy of its users. Today global networked infrastructure requires the ability for parties to communicate in a secure environment while at the same time preserving their privacy. Support for digital identities and definition of privacy-enhanced protocols and techniques for their management and exchange b
APA, Harvard, Vancouver, ISO, and other styles
25

Boberg, Hannes. "Designing and comparing access control systems." Thesis, Linköpings universitet, Programvara och system, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-131855.

Full text
Abstract:
Access control systems are an important concept in the area of computer security. In this master thesis different solutions are analyzed. The focus is on a tool called DW Access. DW Access is developed by Pdb Datasystem AB. A comparison was done that showed that DW Access is lacking some important functionality. After the comparison a base model for an access control system was designed. The new design includes concepts like relation- ships, replacements and time limited access. It also works for generic subjects and objects in the system. This design was later partly implemented in DW Access.
APA, Harvard, Vancouver, ISO, and other styles
26

Chakravarthy, Rasika Mudumbai. "Long-lived authentication protocols for critical infrastructure process control systems." Pullman, Wash. : Washington State University, 2009. http://www.dissertations.wsu.edu/Thesis/Spring2009/r_mudumbai_chakravarthy_041509.pdf.

Full text
Abstract:
Thesis (M.S. in computer science )--Washington State University, May 2009.<br>Title from PDF title page (viewed on March 29, 2010). "School of Electrical Engineering and Computer Science." Includes bibliographical references (p. 112-115).
APA, Harvard, Vancouver, ISO, and other styles
27

Marin, Luis Franco. "SELinux policy management framework for HIS." Thesis, Queensland University of Technology, 2008. https://eprints.qut.edu.au/26358/1/Luis_Franco_Thesis.pdf.

Full text
Abstract:
Health Information Systems (HIS) make extensive use of Information and Communication Technologies (ICT). The use of ICT aids in improving the quality and efficiency of healthcare services by making healthcare information available at the point of care (Goldstein, Groen, Ponkshe, and Wine, 2007). The increasing availability of healthcare data presents security and privacy issues which have not yet been fully addressed (Liu, Caelli, May, and Croll, 2008a). Healthcare organisations have to comply with the security and privacy requirements stated in laws, regulations and ethical standards, while m
APA, Harvard, Vancouver, ISO, and other styles
28

Marin, Luis Franco. "SELinux policy management framework for HIS." Queensland University of Technology, 2008. http://eprints.qut.edu.au/26358/.

Full text
Abstract:
Health Information Systems (HIS) make extensive use of Information and Communication Technologies (ICT). The use of ICT aids in improving the quality and efficiency of healthcare services by making healthcare information available at the point of care (Goldstein, Groen, Ponkshe, and Wine, 2007). The increasing availability of healthcare data presents security and privacy issues which have not yet been fully addressed (Liu, Caelli, May, and Croll, 2008a). Healthcare organisations have to comply with the security and privacy requirements stated in laws, regulations and ethical standards, while m
APA, Harvard, Vancouver, ISO, and other styles
29

Hug-Glanzmann, Gabriela. "Coordinated Power Flow Control to enhance steady-state security in power systems /." Zürich : ETH, 2008. http://e-collection.ethbib.ethz.ch/show?type=diss&nr=17586.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

ZHANG, QI. "Cyber security in discrete event systems: from state estimation to supervisory control." Doctoral thesis, Università degli Studi di Cagliari, 2022. http://hdl.handle.net/11584/338675.

Full text
Abstract:
1. Chapter 3. The problem of state estimation under sensor attack is formalized; harmful attacks are characterized in general terms by means of a misleading relation. The notion of attack alphabet is introduced and attack words are defined to describe how observations can be corrupted by the attacker. On this alphabet two different observers are constructed: they describe the different state estimates computed by the attacker and by the operator for each corrupted observation. A formal procedure to design a supremal stealthy joint subestimator is presented. This structure, constructed refining
APA, Harvard, Vancouver, ISO, and other styles
31

Ceccato, Silvia. "Security in Global Navigation Satellite Systems: authentication, integrity protection and access control." Doctoral thesis, Università degli studi di Padova, 2019. http://hdl.handle.net/11577/3425426.

Full text
Abstract:
In the last decades the use of Global Navigation Satellite System (GNSS) positioning has spread through numerous commercial applications and permeated our daily life. Matching this growing interest for precise positioning worldwide, new systems have been designed and deployed, such as Galileo, the European GNSS. As these systems are relied upon in an ever growing number of safety critical applications, it is vital to devise protections and countermeasures against any threats that may target GNSS modules to harm underlying service. The potential economical advantage that derives from disruptin
APA, Harvard, Vancouver, ISO, and other styles
32

Deshmukh, Pallavi Prafulla. "A Hands-on Modular Laboratory Environment to Foster Learning in Control System Security." Thesis, Virginia Tech, 2016. http://hdl.handle.net/10919/71755.

Full text
Abstract:
Cyber-Physical Systems (CPSes) form the core of Industrial Control Systems (ICS) and critical infrastructures. These systems use computers to control and monitor physical processes in many critical industries including aviation, industrial automation, transportation, communications, waste treatment, and power systems. Increasingly, these systems are connected with corporate networks and the Internet, making them susceptible to risks similar to traditional computing systems experiencing cyber-attacks on a conventional IT network. Furthermore, recent attacks like the Stuxnet worm have demons
APA, Harvard, Vancouver, ISO, and other styles
33

Umsonst, David. "Security Analysis of Control System Anomaly Detectors." Thesis, KTH, Skolan för elektro- och systemteknik (EES), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-196361.

Full text
Abstract:
Anomaly detectors in control systems are used to detect system faults and they are typically based on an analytical system model, which gener-ates residual signals to find a fault. The detectors are designed to detect randomly occurring faults but not coordinated malicious attacks on the system.Therefore three different anomaly detectors, namely a detector solely based on the last residual, a multivariate exponentially weighted moving average filter and a cumulative sum, are investigated to determine which detector yields the smallest worst-case impact of a time-limited data in-jection attack.For
APA, Harvard, Vancouver, ISO, and other styles
34

Tang, Wai-hung, and 鄧偉雄. "An anonymity scheme for file retrieval systems." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2008. http://hub.hku.hk/bib/B40887972.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Dadras, Soodeh. "Security of Vehicular Platooning." DigitalCommons@USU, 2019. https://digitalcommons.usu.edu/etd/7445.

Full text
Abstract:
Platooning concept involves a group of vehicles acting as a single unit through coordination of movements. While Platooning as an evolving trend in mobility and transportation diminishes the individual and manual driving concerns, it creates new risks. New technologies and passenger’s safety and security further complicate matters and make platooning attractive target for the malicious minds. To improve the security of the vehicular platooning, threats and their potential impacts on vehicular platooning should be identified to protect the system against security risks. Furthermore, algorithms
APA, Harvard, Vancouver, ISO, and other styles
36

Acharya, Naresh. "Security, protection, and control of power systems with large-scale wind power penetration." [Ames, Iowa : Iowa State University], 2010. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3403779.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Kibwage, Stephen Sakawa. "Role-Based Access Control Administration of Security Policies and Policy Conflict Resolution in Distributed Systems." NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/30.

Full text
Abstract:
Security models using access control policies have over the years improved from Role-based access control (RBAC) to newer models which have added some features like support for distributed systems and solving problems in older security policy models such as identifying policy conflicts. Access control policies based on hierarchical roles provide more flexibility in controlling system resources for users. The policies allow for granularity when extended to have both allow and deny permissions as well as weighted priority attribute for the rules in the policies. Such flexibility allows administr
APA, Harvard, Vancouver, ISO, and other styles
38

MUTTI, Simone. "Policy and Security Conguration Management in Distributed Systems." Doctoral thesis, Università degli studi di Bergamo, 2015. http://hdl.handle.net/10446/49849.

Full text
Abstract:
The evolution of information system sees a continuously increasing need of flexible and sophisticated approaches for the management of security requirements. On one hand, systems are increasingly more integrated (e.g., Bring Your Own Device) and present interfaces for the invocation of services accessible through network connections. On the other hand, system administrators have the responsibility to guarantee that this integration and the consequent exposure of internal resources does not introduce vulnerabilities. The need to prove that the system correctly manages the security requirements
APA, Harvard, Vancouver, ISO, and other styles
39

Spyridopoulos, Theodoros. "A holistic cyber-protection approach for industrial control systems based on systems theory : cyber security in ICSs." Thesis, University of Bristol, 2016. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.702187.

Full text
Abstract:
Being the cornerstone of today's Industry, Industrial Control Systems (ICSs) play an important role in the overall function and quality of modern society. Their use to control critical processes within the Industry (power production, transportation, manufacturing etc.) makes them an integral part of the Critical National Infrastructure (CNI), as defined by the European Council (2008), rendering thereby their protection a process of critical importance. Traditionally, ICSs have been operated as closed, isolated systems. However, the connection of contemporary ICS installations with external net
APA, Harvard, Vancouver, ISO, and other styles
40

Janardhana, Swamy V. C. "Electronic Access Control Systems: A New Approach." Thesis, Indian Institute of Science, 1994. https://etd.iisc.ac.in/handle/2005/237.

Full text
Abstract:
Security systems are gaining increasing importance in recent times to protect life and valuable resources. Many advanced methods of providing security have been developed and are in use in the last few decades. Of these, one important area is the security system required for military/strategic applications, which has advanced greatly. But, such systems being complex and expensive are useful in high-end applications only. However, with the recent progress in technology and the growing need for increased security in civilian and other applications, many low cost solutions for security systems ha
APA, Harvard, Vancouver, ISO, and other styles
41

Janardhana, Swamy V. C. "Electronic Access Control Systems: A New Approach." Thesis, Indian Institute of Science, 1994. http://hdl.handle.net/2005/237.

Full text
Abstract:
Security systems are gaining increasing importance in recent times to protect life and valuable resources. Many advanced methods of providing security have been developed and are in use in the last few decades. Of these, one important area is the security system required for military/strategic applications, which has advanced greatly. But, such systems being complex and expensive are useful in high-end applications only. However, with the recent progress in technology and the growing need for increased security in civilian and other applications, many low cost solutions for security systems ha
APA, Harvard, Vancouver, ISO, and other styles
42

Hansen, Sinclair D. "An intrusion detection system for supervisory control and data acquisition systems." Thesis, Queensland University of Technology, 2008. https://eprints.qut.edu.au/16636/1/Sinclair_Hansen_Thesis.pdf.

Full text
Abstract:
Despite increased awareness of threats against Critical Infrastructure (CI), securing of Supervisory Control and Data Acquisition (SCADA) systems remains incomplete. The majority of research focuses on preventative measures such as improving communication protocols and implementing security policies. New attempts are being made to use commercial Intrusion Detection System (IDS) software to protect SCADA systems. These have limited effectiveness because the ability to detect specific threats requires the context of the SCADA system. SCADA context is defined as any information that can be used t
APA, Harvard, Vancouver, ISO, and other styles
43

Hansen, Sinclair D. "An intrusion detection system for supervisory control and data acquisition systems." Queensland University of Technology, 2008. http://eprints.qut.edu.au/16636/.

Full text
Abstract:
Despite increased awareness of threats against Critical Infrastructure (CI), securing of Supervisory Control and Data Acquisition (SCADA) systems remains incomplete. The majority of research focuses on preventative measures such as improving communication protocols and implementing security policies. New attempts are being made to use commercial Intrusion Detection System (IDS) software to protect SCADA systems. These have limited effectiveness because the ability to detect specific threats requires the context of the SCADA system. SCADA context is defined as any information that can be used t
APA, Harvard, Vancouver, ISO, and other styles
44

Gunjal, Abhinav Shivram. "Trusted Software Updates for Secure Enclaves in Industrial Control Systems." Thesis, Virginia Tech, 2017. http://hdl.handle.net/10919/79130.

Full text
Abstract:
Industrial Control Systems (ICSs) manage critical infrastructures such as water treatment facilities, petroleum refineries, and power plants. ICSs are networked through Information Technology (IT) infrastructure for remote monitoring and control of physical processes. As ICSs integrate with IT infrastructure, IT vulnerabilities are carried over to the ICS environment. Previously proposed process controller security architectures maintain safe and stable plant operation even in the presence of attacks that exploit ICS vulnerabilities. Security architectures are process control system-level solu
APA, Harvard, Vancouver, ISO, and other styles
45

Franklin, Zane Ryan. "Using High-level Synthesis to Predict and Preempt Attacks on Industrial Control Systems." Thesis, Virginia Tech, 2014. http://hdl.handle.net/10919/47491.

Full text
Abstract:
As the rate and severity of malicious software attacks have escalated, industrial control systems (ICSes) have emerged as a particularly vulnerable target. ICSes govern the automation of the physical processes in industries such as power, water, oil and manufacturing. In contrast to the personal computing space, where attackers attempt to capture information or computing resources, the attacks directed at ICSes aim to degrade or destroy the physical processes or plants maintained by the ICS. Exploits with potentially catastrophic results are sold on brokerages to any interested party. Previou
APA, Harvard, Vancouver, ISO, and other styles
46

De, Arizon Paloma. "Online power system security classifier and enhancement control." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape4/PQDD_0020/NQ48625.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Desso, Nathan H. "Designing a machinery control system (MCS) security testbed." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/43902.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>Industrial control systems (ICS) face daily cyber security threats, can have a significant impact to the security of our nation, and present a difficult challenge to defend. Critical infrastructures, including military systems like the machinery control systems (MCS) found onboard modern U.S. warships, are affected because of their use of commercial automation solutions. The increase of automated control systems within the U.S. Navy saves in manpower costs but increases the need for cyber security research and defense. Research is neede
APA, Harvard, Vancouver, ISO, and other styles
48

Sjövald, Sebastian, and Fredrik Svahn. "Firmware security analysis of an Industrial Control System." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-302374.

Full text
Abstract:
Internet of Things (IoT) devices are becoming more and more popular. However, because the focus during this rise has not been on security they have become a huge attack surface. The purpose of IoT is that devices are interconnected and communicate with each other over the internet. This is especially problematic if these devices control important aspects of our lives such as: air conditioning, heating, water and other machinery. This report is meant to investigate one of these systems, called OPTOEMU-SNR-DR2 (abbreviated as Opto22 in this report), and document potential security flaws. We have
APA, Harvard, Vancouver, ISO, and other styles
49

McGovern, Susan C. "Information security requirements for a coalition wide area network." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2001. http://handle.dtic.mil/100.2/ADA397542.

Full text
Abstract:
Thesis (M.S. in Systems Technology (Command, Control, and Communications)) Naval Postgraduate School, June 2001.<br>Thesis advisor(s): Irvine, Cynthia E. "June 2001." Includes bibliographical references (p. 77-78). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
50

Eriksson, Robert. "Coordinated Control of HVDC Links in Transmission Systems." Doctoral thesis, KTH, Elektriska energisystem, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-30625.

Full text
Abstract:
Dynamic security limits the power transfer capacity between regions and therefore has an economic impact. The power modulation control of high-voltage direct current (HVDC) links can improve the dynamic security of the power system. Having several HVDC links in a system creates the opportunity to coordinate such control, and coordination also ensures that negative interactions do not occur among the controllable devices. This thesis aims to increase dynamic security by coordinating HVDC links, as an alternative to decreasing the transfer capacity. This thesis contributes four control approache
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!