Academic literature on the topic 'Security control framework'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security control framework.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security control framework"
Kumar, Harsh. "Cloud Compliance Security Optimization." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem49485.
Full textWang, Yu Fei, Tao Zhang, Yuan Yuan Ma, and Bo Zhang. "An Information Security Assessments Framework for Power Control Systems." Advanced Materials Research 805-806 (September 2013): 980–84. http://dx.doi.org/10.4028/www.scientific.net/amr.805-806.980.
Full textAl Ketbi, Maitha, Khaled Shuaib, Ezedin Barka, and Marton Gergely. "Establishing a Security Control Framework for Blockchain Technology." Interdisciplinary Journal of Information, Knowledge, and Management 16 (2021): 307–30. http://dx.doi.org/10.28945/4837.
Full textAbdulrahman, H. Altalhi1 Zailani Mohamed Sidek2 Norjihan Abdul Ghani3 Fazidah Othman4 and Maged Abdelkhaleq Al-Sheshtawil5. "ENHANCING THE SECURITY FRAMEWORK SECURECLOUD WITH THE SWIFT IDENTITY MANAGEMENT FRAMEWORK." International Journal on Cloud Computing: Services and Architecture(IJCCSA) 2, February (2018): 01–07. https://doi.org/10.5281/zenodo.1444289.
Full textJi, Kaining, Yitian Liu, and Changju Hu. "Design of Security Control Framework for Power System Microservices." Advances in Engineering Technology Research 13, no. 1 (2025): 777. https://doi.org/10.56028/aetr.13.1.777.2025.
Full textKumar, Anurag, and Prof Bibha Kumari. "Implementing Privacy Preserving Techniques in Distributed Big Data Framework on Cloud Computing." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 008 (2024): 1–14. http://dx.doi.org/10.55041/ijsrem37051.
Full textYogesh Kumar Bhardwaj. "Securing Generative AI: Navigating Data Security Challenges in the AI Era." Journal of Computer Science and Technology Studies 7, no. 4 (2025): 147–55. https://doi.org/10.32996/jcsts.2025.7.4.17.
Full textAlshammari, Ahmad. "A Novel Security Framework to Mitigate and Avoid Unexpected Security Threats in Saudi Arabia." Engineering, Technology & Applied Science Research 13, no. 4 (2023): 11445–50. http://dx.doi.org/10.48084/etasr.6091.
Full textXu, Mudi, Benfeng Chen, Zhizhong Tan, et al. "AHAC: Advanced Network-Hiding Access Control Framework." Applied Sciences 14, no. 13 (2024): 5593. http://dx.doi.org/10.3390/app14135593.
Full textKalwani, Seema. "Quality Framework, Principles, control practices, benchmark, internal controls addressing needs of current world." International Journal of Multidisciplinary Research and Growth Evaluation 2, no. 4 (2021): 919–26. https://doi.org/10.54660/.ijmrge.2021.2.4.919-926.
Full textDissertations / Theses on the topic "Security control framework"
Viljoen, Melanie. "A framework towards effective control in information security governance." Thesis, Nelson Mandela Metropolitan University, 2009. http://hdl.handle.net/10948/887.
Full textBenjuma, Nuria Mahmud. "An educational framework to support industrial control system security engineering." Thesis, De Montfort University, 2017. http://hdl.handle.net/2086/15494.
Full textHuang, Qing. "An extension to the Android access control framework." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-73064.
Full textOkere, Irene Onyekachi. "A control framework for the assessment of information security culture." Thesis, Nelson Mandela Metropolitan University, 2013. http://hdl.handle.net/10948/d1019861.
Full textMarin, Luis Franco. "SELinux policy management framework for HIS." Thesis, Queensland University of Technology, 2008. https://eprints.qut.edu.au/26358/1/Luis_Franco_Thesis.pdf.
Full textMarin, Luis Franco. "SELinux policy management framework for HIS." Queensland University of Technology, 2008. http://eprints.qut.edu.au/26358/.
Full textRunsewe, Olubisi Atinuke. "A Policy-Based Management Framework for Cloud Computing Security." Thesis, Université d'Ottawa / University of Ottawa, 2014. http://hdl.handle.net/10393/31503.
Full textRadhakrishnan, Sakthi Vignesh. "A framework for system fingerprinting." Thesis, Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/47609.
Full textKlosinski, Vance J. "Population and resource control measures a conceptual framework for understanding and implementation." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Dec/09Dec%5FKlosinski.pdf.
Full textNyeem, Hussain Md Abu. "A digital watermarking framework with application to medical image security." Thesis, Queensland University of Technology, 2014. https://eprints.qut.edu.au/74749/1/Hussain%20Md%20Abu_Nyeem_Thesis.pdf.
Full textBooks on the topic "Security control framework"
Victoria. Office of the Auditor-General. WoVG information security management framework. Victorian Government Printer, 2013.
Find full textTimothy, Edmunds, and Germann Wilhelm N. 1941-, eds. Towards security sector reform in post Cold War Europe: A framework for assessment. Nomos, 2003.
Find full textOttawa Verification Symposium (15th 1998 Montebello, Québec). Arms control and the rule of law: A framework for peace and security in outer space : proceedings of the Fifteenth Annual Ottawa NACD Verification Symposium. Centre for International and Security Studies, York University, 1998.
Find full textMarshall, Beier J., Mataija Steven, and York Centre for International and Strategic Studies., eds. Arms control and the rule of law: A framework for peace and security in outer space : proceedings of the Fifteenth Annual Ottawa NACD Verification Symposium. Centre for International and Security Studies, York University, 1998.
Find full textNemati, Hamid R. Privacy solutions and security frameworks in information protection. Information Science Reference, 2013.
Find full textOffice, General Accounting. Defense inventory: Improved management framework needed to guide Army best practice initiatives : report to congressional committees. The Office, 1999.
Find full textOffice, General Accounting. Defense inventory: Improved management framework needed to guide Navy best practice initiatives : report to congressional committees. The Office, 1999.
Find full textOffice, General Accounting. Defense inventory: Improved management framework needed to guide Army best practice initiatives : report to Congressional committees. The Office, 1999.
Find full textOffice, General Accounting. Defense inventory: DOD could improve Total Asset Visibility initiative with Results Act framework : report to Congressional requesters. The Office, 1999.
Find full textOffice, General Accounting. Defense inventory: Improved management framework needed to guide Air Force best practice initiatives : report to congressional committees. The Office, 1999.
Find full textBook chapters on the topic "Security control framework"
Tikk-Ringas, Eneken. "Legal Framework of Cyber Security." In Intelligent Systems, Control and Automation: Science and Engineering. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18302-2_8.
Full textNabhen, Ricardo, Edgard Jamhour, and Carlos Maziero. "A Policy Based Framework for Access Control." In Information and Communications Security. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-39927-8_5.
Full textKayes, A. S. M., Jun Han, and Alan Colman. "ICAF: A Context-Aware Framework for Access Control." In Information Security and Privacy. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31448-3_34.
Full textPosthumus, Shaun, and Rossouw von Solms. "A Responsibility Framework for Information Security." In Security Management, Integrity, and Internal Control in Information Systems. Springer US, 2005. http://dx.doi.org/10.1007/0-387-31167-x_13.
Full textChen, Shiping, Duminda Wijesekera, and Sushil Jajodia. "FlexFlow: A Flexible Flow Control Policy Specification Framework." In Data and Applications Security XVII. Springer US, 2004. http://dx.doi.org/10.1007/1-4020-8070-0_26.
Full textMaity, Soumya, and Soumya K. Ghosh. "A Cognitive Trust Model for Access Control Framework in MANET." In Information Systems Security. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35130-3_6.
Full textChau, Ngoc-Tu, Minh-Duong Nguyen, Seungwook Jung, and Souhwan Jung. "SecaaS Framework and Architecture: A Design of Dynamic Packet Control." In Information Security Applications. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-15087-1_15.
Full textZhu, Quanyan, and Zhiheng Xu. "A Game Framework to Secure Control of CBTC Systems." In Advances in Information Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-60251-2_8.
Full textGow, James, and Ivan Zverzžhanovski. "Rules: The Legal and Institutional Framework for Democratic Control." In Security, Democracy and War Crimes. Palgrave Macmillan UK, 2013. http://dx.doi.org/10.1057/9781137276148_5.
Full textCrampton, Jason, and Michael Huth. "Towards an Access-Control Framework for Countering Insider Threats." In Insider Threats in Cyber Security. Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-7133-3_8.
Full textConference papers on the topic "Security control framework"
Zhang, Jianhong, and Jie Wei. "On the security of NDN's privacy access control framework." In International Conference on Network Communication and Information Security (ICNCIS 2024), edited by Pascal Lorenz and Ljiljana Trajkovic. SPIE, 2025. https://doi.org/10.1117/12.3051997.
Full textSharma, Cheshta, and Tripti Sharma. "Effective Adaptable Framework for Security of IoT Devices." In 2024 International Conference on Communication, Control, and Intelligent Systems (CCIS). IEEE, 2024. https://doi.org/10.1109/ccis63231.2024.10932056.
Full textDangwal, Pushkar, Sumit Yadav, and Bharat Bhushan. "Prescriptive Security Framework for Managing risks and Quantifying Security in Software Development Practices." In 2024 International Conference on Communication, Control, and Intelligent Systems (CCIS). IEEE, 2024. https://doi.org/10.1109/ccis63231.2024.10931938.
Full textZhang, Yaqin, Peilin Lan, Bo Hu, Shiqi Li, Guimin Meng, and Xinyu Gai. "A New Security Framework Towards 5G Enabled Industrial Control System." In 2023 International Conference on Information Processing and Network Provisioning (ICIPNP). IEEE, 2023. https://doi.org/10.1109/icipnp62754.2023.00049.
Full textK, Darshan, Rohan P, and Narendran Sobanapuram Muruganandam. "Machine Learning based Security Enhancement Framework for Software Defined Networks." In 2024 International Conference on Control, Computing, Communication and Materials (ICCCCM). IEEE, 2024. https://doi.org/10.1109/iccccm61016.2024.11039933.
Full textChen, Jingzhao, Yu Fan, and Tengfei Li. "QDGM: A Framework of Detection and Performance Evaluation for Industrial CPS Security." In 2024 43rd Chinese Control Conference (CCC). IEEE, 2024. http://dx.doi.org/10.23919/ccc63176.2024.10661768.
Full textBerhe, Abraham Belay, Ki-Hyung Kim, and Gebere Akele Tizazu. "Industrial control system security framework for ethiopia." In 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN). IEEE, 2017. http://dx.doi.org/10.1109/icufn.2017.7993912.
Full textAftab, Farooq, Shaldon Leparan Suntu, and Zhongshan Zhang. "Self-Organized Security Framework for WiGig WLAN against Attacks and Threats." In 2018 13th APCA International Conference on Automatic Control and Soft Computing (CONTROLO). IEEE, 2018. http://dx.doi.org/10.1109/controlo.2018.8439750.
Full textMarina, Ninoslav, Aneta Velkoska, Natasha Paunkoska, and Ljupcho Baleski. "Security in Twin-code framework." In 2015 7th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT). IEEE, 2015. http://dx.doi.org/10.1109/icumt.2015.7382437.
Full textM, Tony Aby Varkey, Mir Adil, and Swati Singh. "loT Security Enhancement: A Cybersecurity Framework." In 2023 International Conference on Power Energy, Environment & Intelligent Control (PEEIC). IEEE, 2023. http://dx.doi.org/10.1109/peeic59336.2023.10450442.
Full textReports on the topic "Security control framework"
Wayne F. Boyer and Miles A. McQueen. Primer Control System Cyber Security Framework and Technical Metrics. Office of Scientific and Technical Information (OSTI), 2008. http://dx.doi.org/10.2172/935471.
Full textRobert P. Evans. Control Systems Security Center Comparison Study of Industrial Control System Standards against the Control Systems Protection Framework Cyber-Security Requirements. Office of Scientific and Technical Information (OSTI), 2005. http://dx.doi.org/10.2172/911771.
Full textBasbugoglu, Tarik, Roland Fazekas, and Marcus Nicolson. Security Forces Radicalisation Report. Glasgow Caledonian University, 2025. https://doi.org/10.59019/xqhnf105.
Full textLong, Michael, Daniel Bush, Stephen Briggs, et al. An Army guide to navigating the cyber security process for Facility Related Control Systems : cybersecurity and risk management framework explanations for the real world. Engineer Research and Development Center (U.S.), 2020. http://dx.doi.org/10.21079/11681/35294.
Full textMeijer, Karen, and Ann-Sophie Böhle. Climate change adaptation in areas beyond government control: Opportunities and limitations. Stockholm International Peace Research Institute, 2024. http://dx.doi.org/10.55163/rqks8098.
Full textErästö, Tytti. Clearing the Path for Nuclear Disarmament: Confidence-building in the Korean Peninsula. Stockholm International Peace Research Institute, 2025. https://doi.org/10.55163/oydm2762.
Full textBurniske, Jessica, Dustin Lewis, and Naz Modirzadeh. Suppressing Foreign Terrorist Fighters and Supporting Principled Humanitarian Action: A Provisional Framework for Analyzing State Practice. Harvard Law School Program on International Law and Armed Conflict, 2015. http://dx.doi.org/10.54813/nrmd2833.
Full textLewis, Dustin, Radhika Kapoor, and Naz Modirzadeh. Advancing Humanitarian Commitments in Connection with Countering Terrorism: Exploring a Foundational Reframing concerning the Security Council. Harvard Law School Program on International Law and Armed Conflict, 2021. http://dx.doi.org/10.54813/uzav2714.
Full textBajon, Theò. Weapons and Ammunition Management Country Insight: Republic of Côte d’Ivoire. UNIDIR, 2025. https://doi.org/10.37559/caap/25/wam/06.
Full textRagozin, Konstantin. High-tech ecosystem in construction. Intellectual Archive, 2024. http://dx.doi.org/10.32370/iaj.3187.
Full text