To see the other types of publications on this topic, follow the link: Security and control systems.

Journal articles on the topic 'Security and control systems'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Security and control systems.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Hayashi, Kentaro. "Cyber-Security Controls for Industrial Control Systems." JAPAN TAPPI JOURNAL 68, no. 3 (2014): 275–80. http://dx.doi.org/10.2524/jtappij.68.275.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

GAZDA, Karol. "SECURITY OF INDUSTRIAL CONTROL SYSTEMS." Cybersecurity & Cybercrime 1, no. 1 (2021): 75–82. http://dx.doi.org/10.5604/01.3001.0053.8011.

Full text
Abstract:
The study presents a number of elements of the Industrial Control System infrastructurealong with an overview of the concept of ensuring their security while listing cyberthreats with recommendations to mitigate them.
APA, Harvard, Vancouver, ISO, and other styles
3

Hentea, Mariana. "Improving Security for SCADA Control Systems." Interdisciplinary Journal of Information, Knowledge, and Management 3 (2008): 073–86. http://dx.doi.org/10.28945/91.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

FUJITA, Shintaro, and Kenji SAWADA. "Security Measures Technology for Control Systems." Journal of The Institute of Electrical Engineers of Japan 142, no. 4 (2022): 212–14. http://dx.doi.org/10.1541/ieejjournal.142.212.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Amrein, A., V. Angeletti, A. Beitler, et al. "Security intelligence for industrial control systems." IBM Journal of Research and Development 60, no. 4 (2016): 13:1–13:12. http://dx.doi.org/10.1147/jrd.2016.2575698.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Karnasuta, K., C. Treewittayapoom, and A. Tiranuchit. "Security Control of Small Longitudinal Systems." IFAC Proceedings Volumes 22, no. 9 (1989): 61–65. http://dx.doi.org/10.1016/s1474-6670(17)53246-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Miller, A. "Trends in Process Control Systems Security." IEEE Security and Privacy Magazine 3, no. 5 (2005): 57–60. http://dx.doi.org/10.1109/msp.2005.136.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Thopate, Kaushalya, Sandip Shinde, Rupali Mahajan, et al. "Keyless Security." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 8s (2023): 170–74. http://dx.doi.org/10.17762/ijritcc.v11i8s.7187.

Full text
Abstract:
This research paper introduces a novel approach to improve security and access control in smart door lock systems. The proposed system incorporates multi-factor authentication, combining a numerical keypad, mobile app, and RFID sensor. Each authentication method is associated with a specific lock, offering differentiated access control. Notably, the system requires the simultaneous use of the mobile app and RFID sensor to unlock a designated lock, adding an extra layer of security. To assess the system's effectiveness, a comprehensive study was conducted, considering security, usability, and u
APA, Harvard, Vancouver, ISO, and other styles
9

Pretorius, Barend, and Brett van Niekerk. "Cyber-Security for ICS/SCADA." International Journal of Cyber Warfare and Terrorism 6, no. 3 (2016): 1–16. http://dx.doi.org/10.4018/ijcwt.2016070101.

Full text
Abstract:
Industrial control systems (ICS) or supervisory, control, and data acquisition (SCADA) systems drive many key components of the national infrastructure. It makes these control systems targets for cyber-attacks by terrorists and nation-states who wish to damage their target economically and socially, and cyber-criminals who blackmail the companies operating the infrastructure. Despite the high risk of leaving these systems exposed, providing adequate cyber-security is often challenging. The Stuxnet worm illustrated how vulnerable control systems potentially are when it bypassed a number of secu
APA, Harvard, Vancouver, ISO, and other styles
10

Kim, Jaewon, and P. R. Kumar. "Security of Control Systems with Erroneous Observations." IFAC-PapersOnLine 53, no. 2 (2020): 2225–30. http://dx.doi.org/10.1016/j.ifacol.2020.12.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Venkitasubramaniam, Parv, Jiyun Yao, and Parth Pradhan. "Information-Theoretic Security in Stochastic Control Systems." Proceedings of the IEEE 103, no. 10 (2015): 1914–31. http://dx.doi.org/10.1109/jproc.2015.2466089.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Peisert, Sean, Jonathan Margulies, Eric Byres, Paul Dorey, Dale Peterson, and Zach Tudor. "Control Systems Security from the Front Lines." IEEE Security & Privacy 12, no. 6 (2014): 55–58. http://dx.doi.org/10.1109/msp.2014.112.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Popović, Dragana H., David J. Hill, and Qiang Wu. "Optimal voltage security control of power systems." International Journal of Electrical Power & Energy Systems 24, no. 4 (2002): 305–20. http://dx.doi.org/10.1016/s0142-0615(01)00042-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Brandle, Markus, and Martin Naedele. "Security for Process Control Systems: An Overview." IEEE Security & Privacy 6, no. 6 (2008): 24–29. http://dx.doi.org/10.1109/msp.2008.150.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Highland, Esther H. "OMB advocates control model for systems security." Computers & Security 7, no. 4 (1988): 427–28. http://dx.doi.org/10.1016/0167-4048(88)90618-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Geer, D. "Security of Critical Control Systems Sparks Concern." Computer 39, no. 1 (2006): 20–23. http://dx.doi.org/10.1109/mc.2006.32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Vennela, Ms B., Kotra Venkata Satya Ajay, Mohammad Abdul Salman, Tarigoppula Saikiran, and Kolahalam Bhanu Prakash Raju. "RFID-GSM Automatic Gate Control for Highly Secure Organizations." International Journal for Research in Applied Science and Engineering Technology 12, no. 6 (2024): 657–62. http://dx.doi.org/10.22214/ijraset.2024.63190.

Full text
Abstract:
Abstract: In the current dynamic global landscape, security is paramount for organizations, particularly those entrusted with safeguarding sensitive data and valuable assets. Automatic gate control systems are pivotal in fortifying security and optimizing the operational efficiency of access points for highly secure organizations. By integrating Radio-Frequency Identification (RFID) and Global System for Mobile Communications (GSM) technologies, these systems provide sophisticated features that bolster security measures while enabling seamless access for authorized personnel. These automatic g
APA, Harvard, Vancouver, ISO, and other styles
18

Wang, Yu Fei, Tao Zhang, Yuan Yuan Ma, and Bo Zhang. "An Information Security Assessments Framework for Power Control Systems." Advanced Materials Research 805-806 (September 2013): 980–84. http://dx.doi.org/10.4028/www.scientific.net/amr.805-806.980.

Full text
Abstract:
Information and cyber security of Industrial Control Systems (ICS) faces severe challenges and has gained considerable importance. Information security assessment is an essential component of information security assurance infrastructure mechanisms. First, a hierarchical model of smart grid was abstracted. Based on the proposed model and the information security risks and information security protection demands of power control systems, an information security assessments framework for power control systems was proposed in dimensions of system layers and life cycle to guide the security assess
APA, Harvard, Vancouver, ISO, and other styles
19

Klevtsov, O., A. Symonov, and S. Trubchaninov. "Computer Security of NPP Instrumentation and Control Systems: Computer Security Assessment." Nuclear and Radiation Safety, no. 4(88) (December 11, 2020): 69–76. http://dx.doi.org/10.32918/nrs.2020.4(88).09.

Full text
Abstract:
The paper is devoted to the issues of computer security assessment of instrumentation and control systems (I&C systems) of nuclear power plants (NPPs). The authors specified the main areas of assessing the computer security of NPP I&C systems, especially the assessment of cyber threats, vulnerabilities of I&C computer security, sufficiency of applied measures for ensuring I&C systems computer security, risks of I&C system computer security as well as periodic reassessment of I&C computer security. The paper considers the assessment of I&C computer security vulnerabi
APA, Harvard, Vancouver, ISO, and other styles
20

Yang, Xia. "A Novel Information Security Model for Securing Information Systems." Applied Mechanics and Materials 685 (October 2014): 493–96. http://dx.doi.org/10.4028/www.scientific.net/amm.685.493.

Full text
Abstract:
Securing information system in current information era is very important task. This paper presents a novel security model in order to secure sensitive information systems. This model combines protection, detection, recovery and control mechanisms to secure information system in their development lifecycle, which is more effective than the traditional ones.
APA, Harvard, Vancouver, ISO, and other styles
21

Janakiraman, Subramaniam. "CYBER SECURITY FOR INDUSTRIAL AUTOMATION & CONTROL SYSTEMS." Oil and Gas Business, no. 1 (March 6, 2024): 176–94. http://dx.doi.org/10.17122/ogbus-2024-1-176-194.

Full text
Abstract:
Cyber Security is an increasingly important subject while designing an Industrial Automation and Control System (IACS). IACS carries lot of data regarding a facility – Offshore production platform, process platform, Onshore Refinery, Petrochemical, Chemical plant etc. These data are very important to the end-users and stake holders in terms of assessment of production rate, quality of the produce, pros and cons in maintaining the facility, sales, profits and losses, future plans etc. This write-up provides an insight into the following topics:• What is a Cyber Security?• Types of Cyber Securit
APA, Harvard, Vancouver, ISO, and other styles
22

КОРЧИНСЬКИЙ, ВОЛОДИМИР, ІРИНА ТАРАСЕНКО, СЕРГІЙ РАЦИБОРИНСЬКИЙ, ОЛЕКСАНДР АКАЄВ, and АРТЕМ ХАДЖИОГЛО. "AUTOMATED ACCESS CONTROL SYSTEMS." Herald of Khmelnytskyi National University. Technical sciences 333, no. 2 (2024): 140–45. http://dx.doi.org/10.31891/2307-5732-2024-333-2-22.

Full text
Abstract:
The paper provides an overview and analysis of the problems in the application of automated access control systems based on NFC. The capabilities of the Arduino platform are investigated and an access control system with an RFID-NFC module is developed on its basis. The use of automated access control systems in the modern world is becoming increasingly relevant. It involves a number of benefits that such systems can bring to businesses and other entities. These systems simplify and speed up the process of identifying a person, save time and increase the efficiency of security services, but st
APA, Harvard, Vancouver, ISO, and other styles
23

КОРЧИНСЬКИЙ, ВОЛОДИМИР, ІРИНА ТАРАСЕНКО, СЕРГІЙ РАЦИБОРИНСЬКИЙ, ОЛЕКСАНДР АКАЄВ, and АРТЕМ ХАДЖИОГЛО. "AUTOMATED ACCESS CONTROL SYSTEMS." Herald of Khmelnytskyi National University. Technical sciences 331, no. 1 (2024): 291–96. http://dx.doi.org/10.31891/2307-5732-2024-331-44.

Full text
Abstract:
The paper provides an overview and analysis of the problems in the application of automated access control systems based on NFC. The capabilities of the Arduino platform are investigated and an access control system with an RFID-NFC module is developed on its basis. The use of automated access control systems in the modern world is becoming increasingly relevant. It involves a number of benefits that such systems can bring to businesses and other entities. These systems simplify and speed up the process of identifying a person, save time and increase the efficiency of security services, but st
APA, Harvard, Vancouver, ISO, and other styles
24

Mingqian, Wang, and Gu Weijie. "REVIEW ON INFORMATION SECURITY OF INDUSTRIAL CONTROL SYSTEMS." EPH - International Journal of Science And Engineering 5, no. 3 (2019): 1–8. http://dx.doi.org/10.53555/eijse.v5i3.42.

Full text
Abstract:
Industrial control systems (ICS) are widely used in critical infrastructure such as national water resources, power, transportation, energy and so on. These important industrial systems have a profound impact on national security and economic development. In recent years, the occurrence of various security incidents and their serious consequences further reflect the seriousness of the information security situation of industrial control systems. In this paper, the current situation of information security in industrial control systems is summarized and analyzed. The existing problems in ICS in
APA, Harvard, Vancouver, ISO, and other styles
25

Khan, Mohammed Mustafa. "Cyber Security Controls and Countermeasures." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 10 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem12786.

Full text
Abstract:
Today's digital economy encompasses a conglomeration of devices, data, applications, and complex networks that can be hosted on-premises, in data centers or in cloud environments to support business functions. As a cybersecurity professional, you will be tasked to manage risks like cyber threats and data breaches in the workplace. The risks may emanate from the data that resides in the systems, like servers, computers or external drives and the physical assets themselves, like routers and switches. The onus is on preventing security events and limiting the damage or consequences of any event t
APA, Harvard, Vancouver, ISO, and other styles
26

Sulwiński, Józef. "CYBER ATTACKS ON INDUSTRIAL CONTROL SYSTEMS." Cybersecurity & Cybercrime 1, no. 4 (2024): 158–68. http://dx.doi.org/10.5604/01.3001.0054.4141.

Full text
Abstract:
Despite the increase in the overall number of security incidents, attacks on industrial control systems represent only a small fraction of them. It is common to confuse security incidents at critical infrastructure or manufacturing companies that involved ICT systems or took place outside of cyberspace with attacks that directly targeted industrial control system components. In this article, the author analyzes whether such confusion is justified and presents a closer look at the nature of industrial control systems attacks.
APA, Harvard, Vancouver, ISO, and other styles
27

Christos P, Beretas. "Industrial control systems: The biggest cyber threat." Annals of Civil and Environmental Engineering 4, no. 1 (2020): 044–46. http://dx.doi.org/10.29328/journal.acee.1001026.

Full text
Abstract:
Industrial control systems (ICS) are critical, as in these systems, cyber threats have the potential to affect, disorganize, change their mode of operation, act as an information extraction vehicle, and ultimately turn against itself. Creating risks to the system itself, infrastructure, downtime, leakage of sensitive data, and even loss of human life. Industrial control systems (ICS) are vital to the operation of all the modern automated infrastructure in the western world, such as power plant and power stations. Industrial control systems (ICS) differ from the traditional information systems
APA, Harvard, Vancouver, ISO, and other styles
28

Surendra Vitla. "Securing the physical and digital frontier: leveraging identity and access management (IAM) to address the lack of controls on physical access to sensitive systems." International Journal of Science and Research Archive 6, no. 2 (2022): 108–25. https://doi.org/10.30574/ijsra.2022.6.2.0142.

Full text
Abstract:
In an increasingly interconnected world, organizations are facing mounting challenges to secure both physical and digital assets. Traditional physical access control mechanisms, such as locks, keycards, and manual surveillance, are proving insufficient in addressing the sophisticated threats posed by cyberattacks, insider threats, and data breaches. The rise of Identity and Access Management (IAM) systems provides a modern solution to these challenges by integrating physical access controls with digital identity management, offering enhanced security and operational efficiency. IAM systems ena
APA, Harvard, Vancouver, ISO, and other styles
29

Tworek, Bartłomiej. "Cyber security requirements for railway control systems according to standard IEC 62443." WUT Journal of Transportation Engineering 131 (December 1, 2020): 79–86. http://dx.doi.org/10.5604/01.3001.0014.8197.

Full text
Abstract:
Modern railway control systems are based on computer and embedded systems. This components are connected directly via ICT networks, it is also possible to use wireless industrial networks. Cyber security attacks in automation control systems are becoming more dangerous and common. To protect these safety critical systems, the standard IEC 62443 has been developed. This standard provides guidelines and requirements for industrial automation and control systems which also apply to railway systems. This article is mainly focused on chapter IEC 62443-4-2 which provides Technical security requireme
APA, Harvard, Vancouver, ISO, and other styles
30

Gorev, Andrey, Ol'ga Popova, Dmitriy Plotnikov, and Elena Oleschenko. "Efficiency of automated vehicle control in tram systems." Transport automation research 10, no. 1 (2024): 32–51. http://dx.doi.org/10.20295/2412-9186-2024-10-01-32-51.

Full text
Abstract:
The intellectualization of water transport is accompanied by an expansion of the landscape of threats to transport security, caused by the characteristics and weaknesses of the technologies being introduced, which are the convergence of information and telecommunication technologies, automated and automatic control technologies and artificial intelligence. The peculiarity of these technologies is working with large volumes of information. Violation of the security of information processed in intelligent systems of water transport (illegal access, modification, deletion and similar unauthorized
APA, Harvard, Vancouver, ISO, and other styles
31

Marsh, P. "Beyond control [automation system security]." Information Professional 2, no. 2 (2005): 12–16. http://dx.doi.org/10.1049/inp:20050202.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Gorbenko, I. D., and Yu V. Stasev. "Information security in space communication and control systems." Kosmìčna nauka ì tehnologìâ 2, no. 5-6 (1996): 64–68. http://dx.doi.org/10.15407/knit1996.05.064.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Naghnaeian, Mohammad, Nabil H. Hirzallah, and Petros G. Voulgaris. "Security via multirate control in cyber–physical systems." Systems & Control Letters 124 (February 2019): 12–18. http://dx.doi.org/10.1016/j.sysconle.2018.12.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Li, Wenping, and Anjan Bose. "Preventive Control for Dynamic Security of Power Systems." IFAC Proceedings Volumes 28, no. 26 (1995): 379–83. http://dx.doi.org/10.1016/s1474-6670(17)44787-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Lopez, Anthony, Wenlong Jin, and Mohammad Abdullah Al Faruque. "Security analysis for fixed-time traffic control systems." Transportation Research Part B: Methodological 139 (September 2020): 473–95. http://dx.doi.org/10.1016/j.trb.2020.07.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Dibaji, Seyed Mehran, Mohammad Pirani, David Bezalel Flamholz, Anuradha M. Annaswamy, Karl Henrik Johansson, and Aranya Chakrabortty. "A systems and control perspective of CPS security." Annual Reviews in Control 47 (2019): 394–411. http://dx.doi.org/10.1016/j.arcontrol.2019.04.011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Lima, Públio M., Marcos V. S. Alves, Lilian K. Carvalho, and Marcos V. Moreira. "Security Against Network Attacks in Supervisory Control Systems." IFAC-PapersOnLine 50, no. 1 (2017): 12333–38. http://dx.doi.org/10.1016/j.ifacol.2017.08.2161.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Murguia, Carlos, Iman Shames, Justin Ruths, and Dragan Nešić. "Security metrics and synthesis of secure control systems." Automatica 115 (May 2020): 108757. http://dx.doi.org/10.1016/j.automatica.2019.108757.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Mustard, S. "Security of distributed control systems: the concern increases." Computing and Control Engineering 16, no. 6 (2005): 19–25. http://dx.doi.org/10.1049/cce:20050605.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Bakker, Craig, Arnab Bhattacharya, Samrat Chatterjee, and Draguna L. Vrabie. "Hypergames and Cyber-Physical Security for Control Systems." ACM Transactions on Cyber-Physical Systems 4, no. 4 (2020): 1–41. http://dx.doi.org/10.1145/3384676.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Alves, Michel R. C., Karen Rudie, and Patrícia N. Pena. "A Security Testbed for Networked DES Control Systems." IFAC-PapersOnLine 55, no. 28 (2022): 128–34. http://dx.doi.org/10.1016/j.ifacol.2022.10.334.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Amin, Saurabh, Galina A. Schwartz, and S. Shankar Sastry. "Security of interdependent and identical networked control systems." Automatica 49, no. 1 (2013): 186–92. http://dx.doi.org/10.1016/j.automatica.2012.09.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Dontha, Jyothsna Devi. "Edge Computing and Security in Industrial Control Systems." International Scientific Journal of Engineering and Management 03, no. 09 (2024): 1–8. https://doi.org/10.55041/isjem01305.

Full text
Abstract:
Edge computing, integrated with Industrial Control Systems (ICS), is transforming the landscape of industrial automation, providing a decentralized computing model that enables processing data closer to the source. This technology is crucial in optimizing the performance and security of industrial operations, enhancing the efficiency of processes by reducing latency, and mitigating cybersecurity risks. ICS environments are increasingly vulnerable to cyberattacks, and the shift to edge computing offers a promising solution by allowing real-time data processing, which reduces the dependency on c
APA, Harvard, Vancouver, ISO, and other styles
44

Klevtsov, A., A. Symonov, and S. Trubchaninov. "Computer Security of NPP Instrumentation and Control Systems: Categorization." Nuclear and Radiation Safety, no. 4(72) (November 14, 2016): 65–70. http://dx.doi.org/10.32918/nrs.2016.4(72).10.

Full text
Abstract:
The paper is devoted to studying categorization of NPP instrumentation and control (I&C) systems from the point of view of computer security and to consideration of the computer security levels and zones used by the International Atomic Energy Agency (IAEA). The paper also describes the computer security degrees and zones regulated by the International Electrotechnical Commission (IEC) standard. The computer security categorization of the systems used by the U.S. Nuclear Regulatory Commission (NRC) is presented. The experts analyzed the main differences in I&C systems computer security
APA, Harvard, Vancouver, ISO, and other styles
45

Kalyaev, I. A., and E. V. Melnik. "Trusted Control Systems." Mekhatronika, Avtomatizatsiya, Upravlenie 22, no. 5 (2021): 227–36. http://dx.doi.org/10.17587/mau.22.227-236.

Full text
Abstract:
Nowadays, the problem of ensuring security of systems with a critical mission has become particularly relevant. An increased opportunity for unauthorized exposure on such systems via hardware, software and communication networks is the main reason to discuss this problem. It is confirmed by a plenty of accidents when equipment is out of order by means of malicious embedded elements and viruses. Currently, in the Russian Federation the majority of control systems are based on foreign hardware and software platforms, including strategic enterprises and objects with a critical mission. Herewith,
APA, Harvard, Vancouver, ISO, and other styles
46

Edy Susanto, Alvionita Dairo Lende, Akmal Riza Firjatullah, and Reza Almasyah Pratama. "Analisis Keamanan Informasi PT. Indofood Sukses Makmur, Tbk : Studi Kasus tentang Peran Objek Vital, Pengamanan File, dan Pengamanan Cyber." Jurnal Manajemen dan Ekonomi Kreatif 1, no. 3 (2023): 79–87. http://dx.doi.org/10.59024/jumek.v1i3.116.

Full text
Abstract:
Information security analysis of PT. Indofood is a case study that discusses the role of vital objects, file security, and cyber security in the company. PT. Indofood is a large company in the food and beverage industry, which faces significant information security challenges. In terms of vital objects, PT. Indofood identifies critical systems and infrastructure that must be strictly protected. A risk evaluation may have been carried out to identify potential threats and take appropriate steps to protect these vital objects. Access controls, physical safeguards, and security training may have
APA, Harvard, Vancouver, ISO, and other styles
47

Symonov, A., O. Klevtsov, S. Trubchaninov, and O. Lazurenko. "Computer Security of NPP Instrumentation and Control Systems: Computer Security Justification Documents." Nuclear and Radiation Safety, no. 4(84) (December 19, 2019): 73–81. http://dx.doi.org/10.32918/nrs.2019.4(84).09.

Full text
Abstract:
The approaches to the development and management of computer security justification documents on computer security policy, program and plan, computer incident response plan, reports related to computer security are considered in the paper. Requirements for computer security policy, program and plan are presented, and the analysis of different approaches adopted and reflected in the documents of the International Atomic Energy Agency, U.S. Nuclear Regulatory Commission and International Electrotechnical Commission is carried out. It is noted that the approaches used by these organizations to th
APA, Harvard, Vancouver, ISO, and other styles
48

Horalek, Josef, and Vladimir Sobeslav. "Security Baseline for Substation Automation Systems." Sensors 23, no. 16 (2023): 7125. http://dx.doi.org/10.3390/s23167125.

Full text
Abstract:
The use of information technology and the automation of control systems in the energy sector enables a more efficient transmission and distribution of electricity. However, in addition to the many benefits that the deployment of intelligent and largely autonomous systems brings, it also carries risks associated with information and cyber security breaches. Technology systems form a specific and critical communication infrastructure, in which powerful control elements integrating IoT principles and IED devices are present. It also contains intelligent access control systems such as RTU, IDE, HM
APA, Harvard, Vancouver, ISO, and other styles
49

Varlamov, A. A., V. I. Rimshin, and S. Y. Tverskoi. "Security and destruction of technical systems." IFAC-PapersOnLine 51, no. 30 (2018): 808–11. http://dx.doi.org/10.1016/j.ifacol.2018.11.190.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Rao, Nandan, Shubhra Srivastava, and Sreekanth K.S. "PKI Deployment Challenges and Recommendations for ICS Networks." International Journal of Information Security and Privacy 11, no. 2 (2017): 38–48. http://dx.doi.org/10.4018/ijisp.2017040104.

Full text
Abstract:
Different types of Control Systems used for Industrial production are broadly called Industrial Control Systems (ICS) (n.d.). These include Supervisory Control and Data Acquisition (SCADA) Systems and Distributed Control Systems (DCS). ICS typically perform the “Command and Control” operations required for smooth functioning of machines in industrial production. They are widely used in Critical infrastructures such as power generation and distribution systems, Oil and Gas plants, Chemical factories and various other manufacturing facilities. Traditionally, ICS used proprietary protocols and op
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!