Academic literature on the topic 'Security Automation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security Automation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security Automation"
Potter, Bruce. "Security automation." Network Security 2007, no. 9 (2007): 18–19. http://dx.doi.org/10.1016/s1353-4858(07)70084-3.
Full textHighland, HaroldJoseph. "Office automation security." Computers & Security 6, no. 6 (1987): 452–57. http://dx.doi.org/10.1016/0167-4048(87)90023-x.
Full textShahane, Gauri. "Network Security (Automation)." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem30835.
Full textAvinash, Singh, Singh Bharat, Rawat Divyanshu, and Jaint Bhavnesh. "Automation Security System." International Journal of Engineering Research & Science 6, no. 4 (2020): 09–15. https://doi.org/10.5281/zenodo.3767642.
Full textBipin Gajbhiye, Anshika Aggarwal, and DR. Punit Goel. "Security Automation in Application Development Using Robotic Process Automation (RPA)." Universal Research Reports 10, no. 3 (2023): 167–80. http://dx.doi.org/10.36676/urr.v10.i3.1331.
Full textSagar, K. E. CH Vidya, J Swetha, T J Deepika, and S Rajesh. "SIGNIFICANT GROWTH IN HOME AUTOMATION AND ITS SECURITY SYSTEM USING ARDUINO." Journal of Nonlinear Analysis and Optimization 15, no. 02 (2024): 920–28. https://doi.org/10.36893/jnao.2024.v15i2.143.
Full textSilva, Roberto De Carvalho. "AUTOMATION AND OPTIMIZATION OF THE SAP SOFTWARE INSTALLATION PROCESS IN CORPORATE WORKSTATIONS: IMPACTS ON SCALABILITY AND SECURITY." Revista ft 29, no. 145 (2025): 34–35. https://doi.org/10.69849/revistaft/ch10202504040734.
Full textRunde, Markus, Walter Speth, Thomas Steffen, and Christoph Thiell. "Automation Security Risk Assessment." atp edition 58 (January 1, 2016): 48. http://dx.doi.org/10.17560/atp.v58i01-02.551.
Full textKothiyal, Sonakshi. "Automation in Cyber-Security." International Journal for Research in Applied Science and Engineering Technology 7, no. 5 (2019): 581–84. http://dx.doi.org/10.22214/ijraset.2019.5098.
Full textWong, Ken. "Security and Office Automation." EDPACS 15, no. 3 (1987): 5–11. http://dx.doi.org/10.1080/07366988709452219.
Full textDissertations / Theses on the topic "Security Automation"
BRINGHENTI, DANIELE. "Network Security Automation." Doctoral thesis, Politecnico di Torino, 2022. https://hdl.handle.net/11583/2973798.
Full textGill, Khusvinder. "Enhancing the security of wireless sensor network based home automation systems." Thesis, Loughborough University, 2009. https://dspace.lboro.ac.uk/2134/5951.
Full textPeacock, Matthew. "Anomaly Detection in BACnet/IP managed Building Automation Systems." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2019. https://ro.ecu.edu.au/theses/2178.
Full textHabeeb, Richard. "Improving the Security of Building Automation Systems Through an seL4-based Communication Framework." Scholar Commons, 2018. http://scholarcommons.usf.edu/etd/7161.
Full textJose, Arun Cyril. "Intelligent home automation security system based on novel logical sensing and behaviour prediction." Thesis, University of Pretoria, 2017. http://hdl.handle.net/2263/65012.
Full textOulaaffart, Mohamed. "Automating Security Enhancement for Cloud Services." Electronic Thesis or Diss., Université de Lorraine, 2023. http://www.theses.fr/2023LORR0232.
Full textCostley, Austin D. "Platform Development and Path Following Controller Design for Full-Sized Vehicle Automation." DigitalCommons@USU, 2017. https://digitalcommons.usu.edu/etd/6429.
Full textJanes, Ricardo. "Estudo sobre sistemas de segurança em instalações elétricas automatizadas." Universidade de São Paulo, 2009. http://www.teses.usp.br/teses/disponiveis/3/3143/tde-29062009-181507/.
Full textJonnalagadda, Hari Krishna. "Secure Communication Scheme in Smart Home Environment." Scholar Commons, 2016. http://scholarcommons.usf.edu/etd/6270.
Full textAllwood, Gary Andrew. "Intensity based interrogation of optical fibre sensors for industrial automation and intrusion detection systems." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2015. https://ro.ecu.edu.au/theses/1702.
Full textBooks on the topic "Security Automation"
Lehto, Martti, and Pekka Neittaanmäki, eds. Cyber Security: Analytics, Technology and Automation. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18302-2.
Full textBryan, Singer, ed. Industrial automation and process control security. CRC Press, 2012.
Find full textKrutz, Ronald L. Industrial automation and control system security principles. International Society of Automation (ISA), 2013.
Find full textDivision, United States Dept of Commerce Office of Industrial Resource Administration Strategic Analysis. National security assessment of the U.S. robotics industry. U.S. Dept. of Commerce, Bureau of Export Administration, Office of Strategic Industries and Economic Security, Strategic Analysis Division, 1991.
Find full textDivision, United States Dept of Commerce Office of Industrial Resource Administration Strategic Analysis. National security assessment of the U.S. robotics industry. U.S. Dept. of Commerce, Bureau of Export Administration, Office of Strategic Industries and Economic Security, Strategic Analysis Division, 1991.
Find full textUnited States. Dept. of Commerce. Office of Industrial Resource Administration. Strategic Analysis Division. National security assessment of the U.S. robotics industry. U.S. Dept. of Commerce, Bureau of Export Administration, Office of Strategic Industries and Economic Security, Strategic Analysis Division, 1991.
Find full textDivision, United States Dept of Commerce Office of Industrial Resource Administration Strategic Analysis. National security assessment of the U.S. robotics industry. U.S. Dept. of Commerce, Bureau of Export Administration, Office of Strategic Industries and Economic Security, Strategic Analysis Division, 1991.
Find full textAlbrecht, Eduardo. Political Automation. Oxford University Press, 2025. https://doi.org/10.1093/9780197696989.001.0001.
Full textBook chapters on the topic "Security Automation"
Caelli, W. "Office Automation Security." In Information Security for Managers. Palgrave Macmillan UK, 1989. http://dx.doi.org/10.1007/978-1-349-10137-5_6.
Full textOxer, Jonathan, and Hugh Blemings. "Security/Automation Sensors." In Practical Arduino. Apress, 2009. http://dx.doi.org/10.1007/978-1-4302-2478-5_6.
Full textSabharwal, Navin, and Subramani Kasiviswanathan. "HWA Security." In Workload Automation Using HWA. Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-8885-6_16.
Full textIrani, Mohammad Tabatabai, and Edgar R. Weippl. "Automation of Post-exploitation." In Security Technology. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10847-1_31.
Full textAldrian, Andreas, Peter Priller, Christophy Schmittner, et al. "10 Application system design - High security." In IoT Automation. CRC Press, 2017. http://dx.doi.org/10.1201/9781315367897-11.
Full textDutt, Bhishm, Karan Singh, Satvik Vats, Manisha Manjul, Vikrant Sharma, and Ahmad Aziz. "Data security for digital environment." In Automation and Computation. CRC Press, 2023. http://dx.doi.org/10.1201/9781003333500-56.
Full textCalleja, Julian, Lalit Garg, and Vijay Prakash. "Security in Home Automation." In Internet of Things. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-21940-5_10.
Full textMehta, Kaushal, Anmol Sharma, and Lakshya Bhalla. "College Automation Security Management." In Role of ICT in Higher Education. Apple Academic Press, 2020. http://dx.doi.org/10.1201/9781003130864-27.
Full textStevens, Alex. "Security Automation and Orchestration." In Enterprise Fortress. CRC Press, 2025. https://doi.org/10.1201/9781003585923-14.
Full textRawat, Abhay Singh, Pankaj Kumar, Sumeshwar Singh, Resham Taluja, and Rajeev Gupta. "Optimization-based watermarking scheme for security." In Automation and Computation. CRC Press, 2023. http://dx.doi.org/10.1201/9781003333500-35.
Full textConference papers on the topic "Security Automation"
Bennett, Kelly W., and James Robertson. "Database optimization: automation, security, and resiliency." In Disruptive Technologies in Information Sciences IX, edited by Bryant T. Wysocki and Misty Blowers. SPIE, 2025. https://doi.org/10.1117/12.3057423.
Full textBagade, Jayashree V., Sukhvinder Singh Dari, Rekha Dhivrani, Santosh Chowhan, G. Ravivarman, and V. Janakiraman. "Automation Through Machine Learning: Reinvigorating Cyber Security." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10724667.
Full textMorales-Gonzalez, Christopher, Matthew Harper, Boya Yuan, and Xinwen Fu. "On Software Security of Building Automation Systems." In 2025 International Conference on Computing, Networking and Communications (ICNC). IEEE, 2025. https://doi.org/10.1109/icnc64010.2025.10993917.
Full textKrishna, Dondapati Manoj, Medasani Veda Pranay, and Shaik Khaja Mohiddin. "Security Measures in Cloud-Driven Home Automation Systems." In 2024 8th International Conference on Inventive Systems and Control (ICISC). IEEE, 2024. http://dx.doi.org/10.1109/icisc62624.2024.00032.
Full textLeander, Björn, Bjarne Johansson, Saad Mubeen, Mohammad Ashjaei, and Tomas Lindström. "Redundancy Link Security Analysis: An Automation Industry Perspective." In 2024 IEEE 29th International Conference on Emerging Technologies and Factory Automation (ETFA). IEEE, 2024. http://dx.doi.org/10.1109/etfa61755.2024.10710694.
Full textCiupa, Martin, Nicole Tedesco, and Mostafa Ghobadi. "Automating Automation : Master Mentoring Process." In 11th International Conference on Security and its Applications. Academy & Industry Research Collaboration Center (AIRCC), 2018. http://dx.doi.org/10.5121/csit.2018.80103.
Full textEdwards, W. Keith, Erika Shehan Poole, and Jennifer Stoll. "Security automation considered harmful?" In the 2007 Workshop. ACM Press, 2008. http://dx.doi.org/10.1145/1600176.1600182.
Full textTunc, Cihan, Salim Hariri, Mheni Merzouki, et al. "Cloud Security Automation Framework." In 2017 IEEE 2nd International Workshops on Foundations and Applications of Self* Systems (FAS*W). IEEE, 2017. http://dx.doi.org/10.1109/fas-w.2017.164.
Full textKathuria, Samta, Poonam Rawat, Rajesh Singh, Anita Gehlot, Namrata Kathuria, and Shweta Pandey. "Automation Intercession: Cyber Security." In 2022 5th International Conference on Contemporary Computing and Informatics (IC3I). IEEE, 2022. http://dx.doi.org/10.1109/ic3i56241.2022.10073023.
Full textMcKay, Murray. "Best practices in automation security." In 2012 IEEE-IAS/PCA Cement Industry Technical Conference. IEEE, 2012. http://dx.doi.org/10.1109/citcon.2012.6215678.
Full textReports on the topic "Security Automation"
Dempsey, Kelley, Nedim Goren, Paul Eavy, and George Moore. Automation support for security control assessments:. National Institute of Standards and Technology, 2018. http://dx.doi.org/10.6028/nist.ir.8011-3.
Full textDempsey, Kelley, Eduardo Takamura, Paul Eavy, and George Moore. Automation support for security control assessments:. National Institute of Standards and Technology, 2020. http://dx.doi.org/10.6028/nist.ir.8011-4.
Full textCam-Winget, N., and L. Lorenzin. Security Automation and Continuous Monitoring (SACM) Requirements. RFC Editor, 2017. http://dx.doi.org/10.17487/rfc8248.
Full textBooth, Harold, and Adam Halbardier. Trust model for security automation data 1.0 (TMSAD). National Institute of Standards and Technology, 2011. http://dx.doi.org/10.6028/nist.ir.7802.
Full textFarrag, Khalid. Utilizing Cloud Computing Log Events for Security Automation. Iowa State University, 2019. http://dx.doi.org/10.31274/cc-20240624-1574.
Full textDempsey, Kelley, Paul Eavy, and George Moore. Automation support for security control assessments. volume 1: overview. National Institute of Standards and Technology, 2017. http://dx.doi.org/10.6028/nist.ir.8011-1.
Full textQuinn, S. D., D. A. Waltermire, C. S. Johnson, K. A. Scarfone, and J. F. Banghart. The technical specification for the Security Content Automation Protocol (SCAP) :. National Institute of Standards and Technology, 2009. http://dx.doi.org/10.6028/nist.sp.800-126.
Full textWaltermire, D. A., S. D. Quinn, and K. A. Scarfone. The technical specification for the Security Content Automation Protocol (SCAP) :. National Institute of Standards and Technology, 2011. http://dx.doi.org/10.6028/nist.sp.800-126r1.
Full textWaltermire, D. A., S. D. Quinn, K. A. Scarfone, and A. M. Halbardier. The technical specification for the Security Content Automation Protocol (SCAP) :. National Institute of Standards and Technology, 2011. http://dx.doi.org/10.6028/nist.sp.800-126r2.
Full textWaltermire, David, and Jessica Fitzgerald-McKay. Transitioning to the Security Content Automation Protocol (SCAP) Version 2. National Institute of Standards and Technology, 2018. http://dx.doi.org/10.6028/nist.cswp.09102018.
Full text