Journal articles on the topic 'Security and control systems'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security and control systems.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Hayashi, Kentaro. "Cyber-Security Controls for Industrial Control Systems." JAPAN TAPPI JOURNAL 68, no. 3 (2014): 275–80. http://dx.doi.org/10.2524/jtappij.68.275.
Full textGAZDA, Karol. "SECURITY OF INDUSTRIAL CONTROL SYSTEMS." Cybersecurity & Cybercrime 1, no. 1 (2021): 75–82. http://dx.doi.org/10.5604/01.3001.0053.8011.
Full textHentea, Mariana. "Improving Security for SCADA Control Systems." Interdisciplinary Journal of Information, Knowledge, and Management 3 (2008): 073–86. http://dx.doi.org/10.28945/91.
Full textFUJITA, Shintaro, and Kenji SAWADA. "Security Measures Technology for Control Systems." Journal of The Institute of Electrical Engineers of Japan 142, no. 4 (2022): 212–14. http://dx.doi.org/10.1541/ieejjournal.142.212.
Full textAmrein, A., V. Angeletti, A. Beitler, et al. "Security intelligence for industrial control systems." IBM Journal of Research and Development 60, no. 4 (2016): 13:1–13:12. http://dx.doi.org/10.1147/jrd.2016.2575698.
Full textKarnasuta, K., C. Treewittayapoom, and A. Tiranuchit. "Security Control of Small Longitudinal Systems." IFAC Proceedings Volumes 22, no. 9 (1989): 61–65. http://dx.doi.org/10.1016/s1474-6670(17)53246-2.
Full textMiller, A. "Trends in Process Control Systems Security." IEEE Security and Privacy Magazine 3, no. 5 (2005): 57–60. http://dx.doi.org/10.1109/msp.2005.136.
Full textThopate, Kaushalya, Sandip Shinde, Rupali Mahajan, et al. "Keyless Security." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 8s (2023): 170–74. http://dx.doi.org/10.17762/ijritcc.v11i8s.7187.
Full textPretorius, Barend, and Brett van Niekerk. "Cyber-Security for ICS/SCADA." International Journal of Cyber Warfare and Terrorism 6, no. 3 (2016): 1–16. http://dx.doi.org/10.4018/ijcwt.2016070101.
Full textKim, Jaewon, and P. R. Kumar. "Security of Control Systems with Erroneous Observations." IFAC-PapersOnLine 53, no. 2 (2020): 2225–30. http://dx.doi.org/10.1016/j.ifacol.2020.12.008.
Full textVenkitasubramaniam, Parv, Jiyun Yao, and Parth Pradhan. "Information-Theoretic Security in Stochastic Control Systems." Proceedings of the IEEE 103, no. 10 (2015): 1914–31. http://dx.doi.org/10.1109/jproc.2015.2466089.
Full textPeisert, Sean, Jonathan Margulies, Eric Byres, Paul Dorey, Dale Peterson, and Zach Tudor. "Control Systems Security from the Front Lines." IEEE Security & Privacy 12, no. 6 (2014): 55–58. http://dx.doi.org/10.1109/msp.2014.112.
Full textPopović, Dragana H., David J. Hill, and Qiang Wu. "Optimal voltage security control of power systems." International Journal of Electrical Power & Energy Systems 24, no. 4 (2002): 305–20. http://dx.doi.org/10.1016/s0142-0615(01)00042-4.
Full textBrandle, Markus, and Martin Naedele. "Security for Process Control Systems: An Overview." IEEE Security & Privacy 6, no. 6 (2008): 24–29. http://dx.doi.org/10.1109/msp.2008.150.
Full textHighland, Esther H. "OMB advocates control model for systems security." Computers & Security 7, no. 4 (1988): 427–28. http://dx.doi.org/10.1016/0167-4048(88)90618-9.
Full textGeer, D. "Security of Critical Control Systems Sparks Concern." Computer 39, no. 1 (2006): 20–23. http://dx.doi.org/10.1109/mc.2006.32.
Full textVennela, Ms B., Kotra Venkata Satya Ajay, Mohammad Abdul Salman, Tarigoppula Saikiran, and Kolahalam Bhanu Prakash Raju. "RFID-GSM Automatic Gate Control for Highly Secure Organizations." International Journal for Research in Applied Science and Engineering Technology 12, no. 6 (2024): 657–62. http://dx.doi.org/10.22214/ijraset.2024.63190.
Full textWang, Yu Fei, Tao Zhang, Yuan Yuan Ma, and Bo Zhang. "An Information Security Assessments Framework for Power Control Systems." Advanced Materials Research 805-806 (September 2013): 980–84. http://dx.doi.org/10.4028/www.scientific.net/amr.805-806.980.
Full textKlevtsov, O., A. Symonov, and S. Trubchaninov. "Computer Security of NPP Instrumentation and Control Systems: Computer Security Assessment." Nuclear and Radiation Safety, no. 4(88) (December 11, 2020): 69–76. http://dx.doi.org/10.32918/nrs.2020.4(88).09.
Full textYang, Xia. "A Novel Information Security Model for Securing Information Systems." Applied Mechanics and Materials 685 (October 2014): 493–96. http://dx.doi.org/10.4028/www.scientific.net/amm.685.493.
Full textJanakiraman, Subramaniam. "CYBER SECURITY FOR INDUSTRIAL AUTOMATION & CONTROL SYSTEMS." Oil and Gas Business, no. 1 (March 6, 2024): 176–94. http://dx.doi.org/10.17122/ogbus-2024-1-176-194.
Full textКОРЧИНСЬКИЙ, ВОЛОДИМИР, ІРИНА ТАРАСЕНКО, СЕРГІЙ РАЦИБОРИНСЬКИЙ, ОЛЕКСАНДР АКАЄВ, and АРТЕМ ХАДЖИОГЛО. "AUTOMATED ACCESS CONTROL SYSTEMS." Herald of Khmelnytskyi National University. Technical sciences 333, no. 2 (2024): 140–45. http://dx.doi.org/10.31891/2307-5732-2024-333-2-22.
Full textКОРЧИНСЬКИЙ, ВОЛОДИМИР, ІРИНА ТАРАСЕНКО, СЕРГІЙ РАЦИБОРИНСЬКИЙ, ОЛЕКСАНДР АКАЄВ, and АРТЕМ ХАДЖИОГЛО. "AUTOMATED ACCESS CONTROL SYSTEMS." Herald of Khmelnytskyi National University. Technical sciences 331, no. 1 (2024): 291–96. http://dx.doi.org/10.31891/2307-5732-2024-331-44.
Full textMingqian, Wang, and Gu Weijie. "REVIEW ON INFORMATION SECURITY OF INDUSTRIAL CONTROL SYSTEMS." EPH - International Journal of Science And Engineering 5, no. 3 (2019): 1–8. http://dx.doi.org/10.53555/eijse.v5i3.42.
Full textKhan, Mohammed Mustafa. "Cyber Security Controls and Countermeasures." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 10 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem12786.
Full textSulwiński, Józef. "CYBER ATTACKS ON INDUSTRIAL CONTROL SYSTEMS." Cybersecurity & Cybercrime 1, no. 4 (2024): 158–68. http://dx.doi.org/10.5604/01.3001.0054.4141.
Full textChristos P, Beretas. "Industrial control systems: The biggest cyber threat." Annals of Civil and Environmental Engineering 4, no. 1 (2020): 044–46. http://dx.doi.org/10.29328/journal.acee.1001026.
Full textSurendra Vitla. "Securing the physical and digital frontier: leveraging identity and access management (IAM) to address the lack of controls on physical access to sensitive systems." International Journal of Science and Research Archive 6, no. 2 (2022): 108–25. https://doi.org/10.30574/ijsra.2022.6.2.0142.
Full textTworek, Bartłomiej. "Cyber security requirements for railway control systems according to standard IEC 62443." WUT Journal of Transportation Engineering 131 (December 1, 2020): 79–86. http://dx.doi.org/10.5604/01.3001.0014.8197.
Full textGorev, Andrey, Ol'ga Popova, Dmitriy Plotnikov, and Elena Oleschenko. "Efficiency of automated vehicle control in tram systems." Transport automation research 10, no. 1 (2024): 32–51. http://dx.doi.org/10.20295/2412-9186-2024-10-01-32-51.
Full textMarsh, P. "Beyond control [automation system security]." Information Professional 2, no. 2 (2005): 12–16. http://dx.doi.org/10.1049/inp:20050202.
Full textGorbenko, I. D., and Yu V. Stasev. "Information security in space communication and control systems." Kosmìčna nauka ì tehnologìâ 2, no. 5-6 (1996): 64–68. http://dx.doi.org/10.15407/knit1996.05.064.
Full textNaghnaeian, Mohammad, Nabil H. Hirzallah, and Petros G. Voulgaris. "Security via multirate control in cyber–physical systems." Systems & Control Letters 124 (February 2019): 12–18. http://dx.doi.org/10.1016/j.sysconle.2018.12.001.
Full textLi, Wenping, and Anjan Bose. "Preventive Control for Dynamic Security of Power Systems." IFAC Proceedings Volumes 28, no. 26 (1995): 379–83. http://dx.doi.org/10.1016/s1474-6670(17)44787-2.
Full textLopez, Anthony, Wenlong Jin, and Mohammad Abdullah Al Faruque. "Security analysis for fixed-time traffic control systems." Transportation Research Part B: Methodological 139 (September 2020): 473–95. http://dx.doi.org/10.1016/j.trb.2020.07.002.
Full textDibaji, Seyed Mehran, Mohammad Pirani, David Bezalel Flamholz, Anuradha M. Annaswamy, Karl Henrik Johansson, and Aranya Chakrabortty. "A systems and control perspective of CPS security." Annual Reviews in Control 47 (2019): 394–411. http://dx.doi.org/10.1016/j.arcontrol.2019.04.011.
Full textLima, Públio M., Marcos V. S. Alves, Lilian K. Carvalho, and Marcos V. Moreira. "Security Against Network Attacks in Supervisory Control Systems." IFAC-PapersOnLine 50, no. 1 (2017): 12333–38. http://dx.doi.org/10.1016/j.ifacol.2017.08.2161.
Full textMurguia, Carlos, Iman Shames, Justin Ruths, and Dragan Nešić. "Security metrics and synthesis of secure control systems." Automatica 115 (May 2020): 108757. http://dx.doi.org/10.1016/j.automatica.2019.108757.
Full textMustard, S. "Security of distributed control systems: the concern increases." Computing and Control Engineering 16, no. 6 (2005): 19–25. http://dx.doi.org/10.1049/cce:20050605.
Full textBakker, Craig, Arnab Bhattacharya, Samrat Chatterjee, and Draguna L. Vrabie. "Hypergames and Cyber-Physical Security for Control Systems." ACM Transactions on Cyber-Physical Systems 4, no. 4 (2020): 1–41. http://dx.doi.org/10.1145/3384676.
Full textAlves, Michel R. C., Karen Rudie, and Patrícia N. Pena. "A Security Testbed for Networked DES Control Systems." IFAC-PapersOnLine 55, no. 28 (2022): 128–34. http://dx.doi.org/10.1016/j.ifacol.2022.10.334.
Full textAmin, Saurabh, Galina A. Schwartz, and S. Shankar Sastry. "Security of interdependent and identical networked control systems." Automatica 49, no. 1 (2013): 186–92. http://dx.doi.org/10.1016/j.automatica.2012.09.007.
Full textDontha, Jyothsna Devi. "Edge Computing and Security in Industrial Control Systems." International Scientific Journal of Engineering and Management 03, no. 09 (2024): 1–8. https://doi.org/10.55041/isjem01305.
Full textKlevtsov, A., A. Symonov, and S. Trubchaninov. "Computer Security of NPP Instrumentation and Control Systems: Categorization." Nuclear and Radiation Safety, no. 4(72) (November 14, 2016): 65–70. http://dx.doi.org/10.32918/nrs.2016.4(72).10.
Full textKalyaev, I. A., and E. V. Melnik. "Trusted Control Systems." Mekhatronika, Avtomatizatsiya, Upravlenie 22, no. 5 (2021): 227–36. http://dx.doi.org/10.17587/mau.22.227-236.
Full textEdy Susanto, Alvionita Dairo Lende, Akmal Riza Firjatullah, and Reza Almasyah Pratama. "Analisis Keamanan Informasi PT. Indofood Sukses Makmur, Tbk : Studi Kasus tentang Peran Objek Vital, Pengamanan File, dan Pengamanan Cyber." Jurnal Manajemen dan Ekonomi Kreatif 1, no. 3 (2023): 79–87. http://dx.doi.org/10.59024/jumek.v1i3.116.
Full textSymonov, A., O. Klevtsov, S. Trubchaninov, and O. Lazurenko. "Computer Security of NPP Instrumentation and Control Systems: Computer Security Justification Documents." Nuclear and Radiation Safety, no. 4(84) (December 19, 2019): 73–81. http://dx.doi.org/10.32918/nrs.2019.4(84).09.
Full textHoralek, Josef, and Vladimir Sobeslav. "Security Baseline for Substation Automation Systems." Sensors 23, no. 16 (2023): 7125. http://dx.doi.org/10.3390/s23167125.
Full textVarlamov, A. A., V. I. Rimshin, and S. Y. Tverskoi. "Security and destruction of technical systems." IFAC-PapersOnLine 51, no. 30 (2018): 808–11. http://dx.doi.org/10.1016/j.ifacol.2018.11.190.
Full textRao, Nandan, Shubhra Srivastava, and Sreekanth K.S. "PKI Deployment Challenges and Recommendations for ICS Networks." International Journal of Information Security and Privacy 11, no. 2 (2017): 38–48. http://dx.doi.org/10.4018/ijisp.2017040104.
Full text