To see the other types of publications on this topic, follow the link: Security Automation.

Journal articles on the topic 'Security Automation'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Security Automation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Potter, Bruce. "Security automation." Network Security 2007, no. 9 (2007): 18–19. http://dx.doi.org/10.1016/s1353-4858(07)70084-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Highland, HaroldJoseph. "Office automation security." Computers & Security 6, no. 6 (1987): 452–57. http://dx.doi.org/10.1016/0167-4048(87)90023-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Shahane, Gauri. "Network Security (Automation)." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem30835.

Full text
Abstract:
The security of an operator’s network is crucial while being increasingly complex to ensure. This is all the more the case with the evolution of the network towards virtualization. In this paper, we will explain how to secure a network and then give some real examples of automation implemented to ensure this security. Finally, we will detail the new risks associated with the implementation of automation tools and share some good security practices around their implementation. Keywords : Network security automation
APA, Harvard, Vancouver, ISO, and other styles
4

Avinash, Singh, Singh Bharat, Rawat Divyanshu, and Jaint Bhavnesh. "Automation Security System." International Journal of Engineering Research & Science 6, no. 4 (2020): 09–15. https://doi.org/10.5281/zenodo.3767642.

Full text
Abstract:
<strong><em>Abstract</em></strong><strong>&mdash;</strong> <em>Security systems has seen a rapid rise in its place in research and development, in the field of home automation and industries. This is a field where development occurs regularly yet still always leave some room for growth. In this paper, an endeavour has been made to develop advanced automation security system with ultrasonic range module, stepper motor and GSM module to detect theft. When a person comes within the range of the system, along with an alarm buzz and led indication, an alert message is sent using GSM module touser&r
APA, Harvard, Vancouver, ISO, and other styles
5

Bipin Gajbhiye, Anshika Aggarwal, and DR. Punit Goel. "Security Automation in Application Development Using Robotic Process Automation (RPA)." Universal Research Reports 10, no. 3 (2023): 167–80. http://dx.doi.org/10.36676/urr.v10.i3.1331.

Full text
Abstract:
In the contemporary digital landscape, the rapid advancement of application development necessitates a parallel evolution in security measures. Traditional security practices often struggle to keep pace with the dynamic nature of modern software development. To address these challenges, Robotic Process Automation (RPA) emerges as a transformative tool, offering substantial potential to automate security tasks within the application development lifecycle. This paper explores the integration of RPA into security automation, focusing on its capabilities to enhance security protocols, minimize hum
APA, Harvard, Vancouver, ISO, and other styles
6

Sagar, K. E. CH Vidya, J Swetha, T J Deepika, and S Rajesh. "SIGNIFICANT GROWTH IN HOME AUTOMATION AND ITS SECURITY SYSTEM USING ARDUINO." Journal of Nonlinear Analysis and Optimization 15, no. 02 (2024): 920–28. https://doi.org/10.36893/jnao.2024.v15i2.143.

Full text
Abstract:
Because automation enables activities to be accomplished with less human interaction and more effectively, it has become increasingly important in today's society (for example, in household and industrial automation). The practise of automating household chores and appliances so they may be managed remotely via a phone or computer is known as home automation. A home security system includes alarm systems, smoke detectors, security cameras, and other sensors. In this project, a home automation and security system is created. The HC05 Bluetooth module and an Arduino UNO R3 microcontroller board
APA, Harvard, Vancouver, ISO, and other styles
7

Silva, Roberto De Carvalho. "AUTOMATION AND OPTIMIZATION OF THE SAP SOFTWARE INSTALLATION PROCESS IN CORPORATE WORKSTATIONS: IMPACTS ON SCALABILITY AND SECURITY." Revista ft 29, no. 145 (2025): 34–35. https://doi.org/10.69849/revistaft/ch10202504040734.

Full text
Abstract:
The automation and optimization of SAP software installation in corporate workstations are critical for enhancing scalability, security, and efficiency. Manual deployment processes are time-consuming, error-prone, and challenging to standardize in large-scale environments. This study explores automation tools such as Ansible, Terraform, and SCCM to streamline SAP deployment, reducing manual intervention and ensuring consistent configurations across multiple devices. The research also highlights the significance of security measures, including system hardening, least privilege policies, and mul
APA, Harvard, Vancouver, ISO, and other styles
8

Runde, Markus, Walter Speth, Thomas Steffen, and Christoph Thiell. "Automation Security Risk Assessment." atp edition 58 (January 1, 2016): 48. http://dx.doi.org/10.17560/atp.v58i01-02.551.

Full text
Abstract:
Um Security-Schutzmaßnahmen für die Automatisierungstechnik sinnvoll zu implementieren, wird eine Entscheidungsgrundlage benötigt. Eine Risikoanalyse, die Werte erfasst und ermittelt, kann das leisten. Der Beitrag stellt praktische Herangehensweisen zur Durchführung von Risikoanalysen vor, die eine Auswahl von hinreichenden Schutzmaßnahmen erlaubt.
APA, Harvard, Vancouver, ISO, and other styles
9

Kothiyal, Sonakshi. "Automation in Cyber-Security." International Journal for Research in Applied Science and Engineering Technology 7, no. 5 (2019): 581–84. http://dx.doi.org/10.22214/ijraset.2019.5098.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wong, Ken. "Security and Office Automation." EDPACS 15, no. 3 (1987): 5–11. http://dx.doi.org/10.1080/07366988709452219.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Wong, Ken. "Security and office automation." Computers & Security 7, no. 1 (1988): 106–7. http://dx.doi.org/10.1016/0167-4048(88)90548-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Radack, Shirley, and Rick Kuhn. "Managing Security: The Security Content Automation Protocol." IT Professional 13, no. 1 (2011): 9–11. http://dx.doi.org/10.1109/mitp.2011.11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Ravi, Chandra Thota. "Cloud-Native DevSecOps: Integrating Security Automation into CI/CD Pipelines." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 10, no. 6 (2024): 1–19. https://doi.org/10.5281/zenodo.15036934.

Full text
Abstract:
As software has become deployed more rapidly in the current fast pace of software development, security has become important, particularly in cloud-native environments where CI/CD pipelines play an important role in operations. Many ways we use to secure traditional systems do not keep up with the fluidity and the fact that they are automated in modern DevOps workflows. As a result, DevSecOps&mdash;combining security with the DevOps process&mdash;has become the key strategy to maintain the software's security while retaining speed and agility. This article discusses how security automation can
APA, Harvard, Vancouver, ISO, and other styles
14

Sandhya, Guduru. "Cloud Security Automation: Enforcing CIS Benchmarks with AWS Config, Azure Policy, and OpenStack Chef Cookbooks." Journal of Scientific and Engineering Research 7, no. 10 (2020): 243–48. https://doi.org/10.5281/zenodo.15234591.

Full text
Abstract:
As cloud environments grow increasingly complex, organizations face challenges in maintaining security and compliance across multi-cloud infrastructures. Traditional security management methods often lead to misconfigurations, compliance violations, and increased attack surfaces. To address these risks, cloud security automation using policy-as-code frameworks, such as AWS Config, Azure Policy, and OpenStack Chef Cookbooks, enables organizations to enforce security controls programmatically. This paper evaluates these frameworks' effectiveness in automating security compliance, enforcing Cente
APA, Harvard, Vancouver, ISO, and other styles
15

Prof., S. S. Mhaske*1 Rupali J. Nirmal2 Dr. C. M. Jadhao3 &. Prof. P. S. Nimat3. "REVIEW PAPER ON HOME AUTOMATION AND SECURITY USING IOT." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES [NC-Rase 18] (November 15, 2018): 55–60. https://doi.org/10.5281/zenodo.1488701.

Full text
Abstract:
Home Automation and security is essential for occupants&lsquo; convenience and protection. This paper aims at automating home appliances and providing sensor based security using Wi-Fi protocol. There are many protocols for communication and data transfer like Zig Bee, Bluetooth, Z-wave and GSM but all these have range issues so here we are using internet for data uploading. This paper sheds the light on implementation of home automation and security system using raspberry pi kit, pi camera and different sensors like gas, ultrasonic, motion,&nbsp; etc. This paper analyses the feasibility, reli
APA, Harvard, Vancouver, ISO, and other styles
16

Jafarov, N. "REDUCING CYBERSECURITY RISKS BY AUTOMATIZING RISK MANAGEMENT." Znanstvena misel journal, no. 97 (December 30, 2024): 52–55. https://doi.org/10.5281/zenodo.14575450.

Full text
Abstract:
The article explains how to reduce cybersecurity risks by automating risk management. The capabilities of the Security Vision Cyber Risk System, which creates the basis for automating the full cycle of cyber risk management, are explained. The essence of risk management automation and what it is needed for are given, as well as the main advantages of risk management automation.
APA, Harvard, Vancouver, ISO, and other styles
17

Stodolsky, D. S. "Automation of Contagion Vigilance." Methods of Information in Medicine 36, no. 03 (1997): 221–32. http://dx.doi.org/10.1055/s-0038-1636827.

Full text
Abstract:
The very long latency between HIV infection and the appearance of AIDS imposes extensive information processing requirements on partner notification efforts. The apparently contradictory needs of maintaining the right to privacy of infected persons, while simultaneously providing information to persons at risk of infection, impose severe security requirements. These requirements can be satisfied by a Contagion Management System based upon networked personal computers of a kind now becoming available. Security of information is based upon cryptographic protocols that implement anonymous partner
APA, Harvard, Vancouver, ISO, and other styles
18

Priyadharsini, S. "Home Automation and Security System." International Journal for Research in Applied Science and Engineering Technology V, no. III (2017): 1174–79. http://dx.doi.org/10.22214/ijraset.2017.3215.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Kaur, Surinder, Rashmi Singh, Neha Khairwal, and Pratyk Jain. "HOME AUTOMATION AND SECURITY SYSTEM." Advanced Computational Intelligence: An International Journal (ACII) 3, no. 3 (2016): 17–23. http://dx.doi.org/10.5121/acii.2016.3303.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Mathew, Alex. "Cybersecurity Infrastructure and Security Automation." Advanced Computing: An International Journal 10, no. 6 (2019): 1–7. http://dx.doi.org/10.5121/acij.2019.10601.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Chien, Ting-Li, Kuo-Lan Su, and Jr-Hung Guo. "Intelligent Home-Automation Security System." International Journal of Automation Technology 3, no. 2 (2009): 121–29. http://dx.doi.org/10.20965/ijat.2009.p0123.

Full text
Abstract:
The objective of the home security detection and appliance control system is to protect occupants against events -- many of which are attributable to human error. We have developed a module based security system for home automation. The structure of the security system is divided into many modules. Each module in the home -- automation security system we develop has a wireless RF and a speech interface. They contain fire detection module, intruder detection module, environment detection module, gas detection module, (AC) power detection and diagnosis module, appliance control module and team r
APA, Harvard, Vancouver, ISO, and other styles
22

Granzer, Wolfgang, Fritz Praus, and Wolfgang Kastner. "Security in Building Automation Systems." IEEE Transactions on Industrial Electronics 57, no. 11 (2010): 3622–30. http://dx.doi.org/10.1109/tie.2009.2036033.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

G, SHYAMALA, Ronith Gowda, Sashikiran Gavanivari, Suvith K S, and Vishwamohan Narendra. "Home Automation Security Using Blockchain." International Journal of Computer Science and Engineering 7, no. 7 (2020): 63–68. http://dx.doi.org/10.14445/23488387/ijcse-v7i7p111.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Marsh, P. "Beyond control [automation system security]." Information Professional 2, no. 2 (2005): 12–16. http://dx.doi.org/10.1049/inp:20050202.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Edwards, Chris. "Automation Key to Hardware Security." New Electronics 55, no. 10 (2022): 28–29. http://dx.doi.org/10.12968/s0047-9624(23)60439-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

SIDDHARTH, B. R., RANJAN RAVI, and SARDAR BASHA N. "HOME DOOR AUTOMATION SYSTEM." INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT] 4, no. 12 (2018): 1–5. https://doi.org/10.5281/zenodo.1135412.

Full text
Abstract:
Our fundamental target is to use the distinctive electronic parts accessible in the market and fabricate a coordinated home security framework by utilizing Bluetooth gadget and Microcontroller innovation. This framework gives benefit with ease thought about to the cost of the accessible security framework. We need to make a framework that will give 24 into 7-benefit .
APA, Harvard, Vancouver, ISO, and other styles
27

JASMINE, PEMEENA PRIYADARISINI M., SARDAR BASHA N., RANJAN RAVI, and B. R. SIDDHARTH. "HOME DOOR AUTOMATION SYSTEM." IJIERT - International Journal of Innovations in Engineering Research and Technology 4, no. 12 (2017): 1–5. https://doi.org/10.5281/zenodo.1456246.

Full text
Abstract:
<strong>Our fundamental target is to use the distinctive electronic parts accessible in the market and fabricate a coordinated home security framework by utilizing Bluetooth gadget and Micro controller innovation. This framework gives benefit with ease thought about to the cost of the accessible security framework. We need to make a framework that will give 24 into 7 - benefit .By utilizing enlisted secret word in this framework we can open the entryway by which it builds the security level to keep an unapproved opening. In the event that the client overlooks the blend of secret key this frame
APA, Harvard, Vancouver, ISO, and other styles
28

Ifeanyi, Chukwuagu M., Ogbu Gregory, and Chukwu Linus. "Improving Cyber Security in Power Systems and Substation Automation Using Intelligent Based System." American Journal of Multidisciplinary Research and Innovation 4, no. 4 (2025): 47–63. https://doi.org/10.54536/ajmri.v4i4.4823.

Full text
Abstract:
The constant failure in cyber security in power systems and substation automation that has crippled business activities that mostly depend on power to run their routine activities are caused by Lack of Adequate Security Measures, Human Error, Outdated Software and Hardware, Insufficient Training and Awareness, Insider Threats, Weak Access Control Mechanisms, Inadequate Network Segmentation, Failure to Patch Vulnerabilities, Complexity of the System, Third-Party Vendor Risks and Denial of Service (DoS) Vulnerabilities. This is surmounted by introducing improved cyber security in power systems a
APA, Harvard, Vancouver, ISO, and other styles
29

Cunha, Lilian. "ACCOUNTING AUTOMATION WITH N8N: POSSIBILITIES, LIMITS, AND IMPACTS FOR SMALL BUSINESSES." Revista ft 29, no. 146 (2025): 22–23. https://doi.org/10.69849/revistaft/dt10202505281222.

Full text
Abstract:
Abstract The automation of accounting processes has become an essential tool for businesses aiming to enhance operational efficiency and reduce human error. n8n, an open-source automation platform, presents an accessible and cost-effective solution for small businesses looking to streamline their accounting workflows. This article explores the possibilities, limitations, and impacts of using n8n for accounting automation in small enterprises. It highlights the flexibility of n8n in automating tasks such as invoicing, data entry, and reconciliation, while also discussing the challenges of integ
APA, Harvard, Vancouver, ISO, and other styles
30

Sujan Kumar, Kummari. "Next-Generation Security Operations: Leveraging Automation for Proactive Threat Mitigation." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem43432.

Full text
Abstract:
ABSTRACT As cybersecurity threats evolve, traditional Security Operations Centers (SOCs) face challenges such as alert overload, manual processes, and delayed incident response. The proposed method is automated SOC solution leveraging open-source technologies to enhance threat detection, streamline investigation processes, and enable proactive threat mitigation. The approach integrates comprehensive threat monitoring, a collaborative case management system, and an automation framework for security response actions. By implementing predefined processes and responsive capabilities, the solution
APA, Harvard, Vancouver, ISO, and other styles
31

Tilbury, Jack, and Stephen Flowerday. "Automation Bias and Complacency in Security Operation Centers." Computers 13, no. 7 (2024): 165. http://dx.doi.org/10.3390/computers13070165.

Full text
Abstract:
The volume and complexity of alerts that security operation center (SOC) analysts must manage necessitate automation. Increased automation in SOCs amplifies the risk of automation bias and complacency whereby security analysts become over-reliant on automation, failing to seek confirmatory or contradictory information. To identify automation characteristics that assist in the mitigation of automation bias and complacency, we investigated the current and proposed application areas of automation in SOCs and discussed its implications for security analysts. A scoping review of 599 articles from f
APA, Harvard, Vancouver, ISO, and other styles
32

Cho, Do-Eun. "Smart Contract Security Vulnerability Analysis and Security Automation Model." Journal of Digital Contents Society 25, no. 4 (2024): 1087–94. http://dx.doi.org/10.9728/dcs.2024.25.4.1087.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Chen, Liang, Xiao Jun Zuo, and Yu Fei Wang. "Research on Information Security Test Bed and Evaluation Framework for Distribution Automation System." Applied Mechanics and Materials 737 (March 2015): 210–13. http://dx.doi.org/10.4028/www.scientific.net/amm.737.210.

Full text
Abstract:
Analyzing the characters and abstracting the system model of the distribution automation system, information security test-bed of distribution automation is designed. Meanwhile, information security test and evaluation framework is proposed based on the lifecycle of distribution automation system. The evaluation activities and the testing methods are analyzed and key problems and solutions of information security evaluation and reinforcement requirements for distribution automation system are introduced. The work in this paper can effectively support the information security protection of dist
APA, Harvard, Vancouver, ISO, and other styles
34

Shekar, Vinay C., Sayeed Ur Rahman, Srinivas Vishal Bhat DB, Abdul Mateen, and Ranjitha A.S. "Enhanced Network Security for IoT based Home Automation System." International Journal of Emerging Research in Management and Technology 6, no. 6 (2018): 278. http://dx.doi.org/10.23956/ijermt.v6i6.282.

Full text
Abstract:
Advancement in automation technology has led to automation in many specific fields which has made life simpler and easier in all aspects. Where in the rise of Internet of Things (IoT) is taking advantage of the evolving automation technology, once such field in which the IoT is taking advantage of automation technology is Home Automation (HA). IoT for home automation is used in order to control home appliances such as lights, ovens, refrigerators, fans etc., In this project we present a home automation system with the help of Raspberry Pi added to which we provide enhanced network security to
APA, Harvard, Vancouver, ISO, and other styles
35

Tilbury, Jack, and Stephen Flowerday. "Humans and Automation: Augmenting Security Operation Centers." Journal of Cybersecurity and Privacy 4, no. 3 (2024): 388–409. http://dx.doi.org/10.3390/jcp4030020.

Full text
Abstract:
The continuous integration of automated tools into security operation centers (SOCs) increases the volume of alerts for security analysts. This amplifies the risk of automation bias and complacency to the point that security analysts have reported missing, ignoring, and not acting upon critical alerts. Enhancing the SOC environment has predominantly been researched from a technical standpoint, failing to consider the socio-technical elements adequately. However, our research fills this gap and provides practical insights for optimizing processes in SOCs. The synergy between security analysts a
APA, Harvard, Vancouver, ISO, and other styles
36

Sridevi Kakolu and Muhammad Ashraf Faheem. "Revolutionizing industries through digitization: The strategic importance of mobile application automation." International Journal of Science and Research Archive 8, no. 1 (2023): 973–87. http://dx.doi.org/10.30574/ijsra.2023.8.1.0276.

Full text
Abstract:
In this article, we look at how mobile application automation is a game changer in the digitization of different industries. It discusses how automation makes work more efficient, cuts costs, and offers better user experience by automating app development and deployment processes. The challenges of mobile application automation are discussed, and the challenges and problems that mobile devices present are primarily focused on, such as incompatibility, introducing costs in the setup, and issues with privacy and security. It provides an overview of popular automation tools, i.e., Appium and Sele
APA, Harvard, Vancouver, ISO, and other styles
37

Chinthamu, Narender, Ashish, Victor Emmanuel P, Mathiyalagan P, Syed Zahidur Rashid, and Jothi E. "Robotic Process Automation in Business Processes Streamlining Operations Through Automation Technologies." ITM Web of Conferences 76 (2025): 01005. https://doi.org/10.1051/itmconf/20257601005.

Full text
Abstract:
RPA also known as Robotic Process Automation is revolutionizing the way businesses operate by automating mundane tasks, increasing operational efficiency, and lowering the overall operational cost. Yet, researchers study theoretical benefits prevalent in the State of the Art, without validating them empirically, or studying their impact across industries or in the long term. About the study This study aspires to fill these gaps, offering a data and challenge-driven and scalable framework of RPA adoption. In this study, we incorporate real-world perspectives, AI-supported automation, and proces
APA, Harvard, Vancouver, ISO, and other styles
38

Liu, Fang. "Social Security Research under Automation Control." Applied Mechanics and Materials 340 (July 2013): 621–25. http://dx.doi.org/10.4028/www.scientific.net/amm.340.621.

Full text
Abstract:
The development of the modern welfare state is not isolated; their welfare policy implementation depends on the advanced economy, extensive coverage, the perfect system, the diversification and welfare system mandatory. Social network analysis is just take this dependence into account, and develop corresponding method to deal with the relationship between variables. This paper, based on the p* model analysis, takes Sweden and Finland, two typical Nordic welfare state, as the examples, and finds the differences in disease disability insurance, unemployment insurance and etc. To understand these
APA, Harvard, Vancouver, ISO, and other styles
39

Singh, Er Dhananjali, Satyendra Kumar Singh, and Jitendra Kumar Yadav. "Home Automation and Security Using IOT." IJARCCE 8, no. 5 (2019): 52–56. http://dx.doi.org/10.17148/ijarcce.2019.8512.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Kirubakaran, B., K. Baveena, M. Keerthana, and R. Ramya. "Automation Based StairBOT for Security Application." DJ Journal of Advances in Electronics and Communication Engineering 4, no. 2 (2018): 17–21. http://dx.doi.org/10.18831/djece.org/2018021003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Treytl, Albert, Peter Palensky, and Thilo Sauter. "SECURITY CONSIDERATIONS FOR ENERGY AUTOMATION NETWORKS." IFAC Proceedings Volumes 38, no. 2 (2005): 158–65. http://dx.doi.org/10.3182/20051114-2-mx-3901.00023.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Rathod, Ishwarlal, Anuprita P. Linge, Dev Davda, Rohit Manna, and Nividh Parekh. "Security Automation System by Unique Identifier." International Journal of Innovations in Engineering and Science 9, no. 1 (2024): 104–7. http://dx.doi.org/10.46335/ijies.2024.9.1.19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Moreira, Naiara, Elías Molina, Jesús Lázaro, Eduardo Jacob, and Armando Astarloa. "Cyber-security in substation automation systems." Renewable and Sustainable Energy Reviews 54 (February 2016): 1552–62. http://dx.doi.org/10.1016/j.rser.2015.10.124.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Edelson, Eve. "Building automation security in office buildings." Computer Fraud & Security 2004, no. 10 (2004): 4–6. http://dx.doi.org/10.1016/s1361-3723(04)00120-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Highland,, Harold Joseph. "Program aids for office automation security." Computers & Security 7, no. 1 (1988): 37–43. http://dx.doi.org/10.1016/0167-4048(88)90500-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Keenan, Thomas P. "Emerging vulnerabilities in office automation security." Computers & Security 8, no. 3 (1989): 223–27. http://dx.doi.org/10.1016/0167-4048(89)90105-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Horalek, Josef, and Vladimir Sobeslav. "Security Baseline for Substation Automation Systems." Sensors 23, no. 16 (2023): 7125. http://dx.doi.org/10.3390/s23167125.

Full text
Abstract:
The use of information technology and the automation of control systems in the energy sector enables a more efficient transmission and distribution of electricity. However, in addition to the many benefits that the deployment of intelligent and largely autonomous systems brings, it also carries risks associated with information and cyber security breaches. Technology systems form a specific and critical communication infrastructure, in which powerful control elements integrating IoT principles and IED devices are present. It also contains intelligent access control systems such as RTU, IDE, HM
APA, Harvard, Vancouver, ISO, and other styles
48

Patel, Jay Prakash, and Mansi Kapoor. "Home Automation New Approach for Security." International Journal of Advance Research and Innovation 3, no. 1 (2015): 130–33. http://dx.doi.org/10.51976/ijari.311524.

Full text
Abstract:
This paper explains an investigation into the potential for remote controlled operation of home automation systems. It considers problems with their implementation, discusses possible solutions through various network technologies and indicates how to optimize the use of such systems. The home is an eternal, heterogeneous, distributed computing environment which certainly requires a careful study before developing any suitable Home Automation System that will accomplish its requirements. Nevertheless the latest attempts at introducing Home Automation Systems in actual homes for all kinds of us
APA, Harvard, Vancouver, ISO, and other styles
49

Neves, Ângelo, and Gisele Lemes Veiga Araujo. "Smart Automation for Enhancing Cyber-Security." Foresight and STI Governance 17, no. 1 (2023): 89–97. http://dx.doi.org/10.17323/2500-2597.2023.1.89.97.

Full text
Abstract:
In an intelligent automation ecosystem, namely in the context of Robotic Process Automation, there is a need to review the development and operation processes and practices, to combine competences from these two areas with the common good necessary for any organization or security team. It is with security that quality, efficiency, and profitability become possible. The elaboration of guidelines and best practices for the application of a DevSecOps culture is currently essential for Agile software development at any organization. In the digitalization era, teams increasingly need a collaborati
APA, Harvard, Vancouver, ISO, and other styles
50

Weil, Ramon. "Security Orchestration, Automation and Response (SOAR)." Technische Sicherheit 13, no. 11-12 (2023): 41–42. http://dx.doi.org/10.37544/2191-0073-2023-11-12-41.

Full text
Abstract:
Risikobewusste Unternehmen haben in der Regel mehrere IT-Sicherheitslösungen im Einsatz, um ihre Organisation vor Cyberbedrohungen zu schützen. Auch wenn die einzelnen Tools optimal funktionieren – sie arbeiten nicht unbedingt zusammen. Aufgrund begrenzter Ressourcen und dem Mangel an verfügbaren Fachkräften besteht für viele Unternehmen die besondere Herausforderung, mit dieser Entwicklung Schritt zu halten. Aus diesem Grund hat die Weiterentwicklung von Security Orchestration, Automation and Response (SOAR) deutlich an Fahrt aufgenommen. Der Beitrag zeigt, wie SOAR-Systeme die Cybersicherhei
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!