Academic literature on the topic 'Security control framework'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security control framework.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Security control framework"

1

Kumar, Harsh. "Cloud Compliance Security Optimization." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem49485.

Full text
Abstract:
Abstract— Managing compliance with diverse regulatory standards in cloud environments poses considerable operational challenges for modern enterprises. Manual processes, duplicated efforts, and lack of traceability often complicate the audit lifecycle, especially when multiple frameworks like PCI DSS, ISO 27001, SOC 1, SOC 2, and C5 are involved. This paper introduces a scalable compliance optimization framework developed and deployed within Enterprise internal audit ecosystem to streamline audit readiness and control management. The framework integrates tools such as Compliance manager, Signa
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, Yu Fei, Tao Zhang, Yuan Yuan Ma, and Bo Zhang. "An Information Security Assessments Framework for Power Control Systems." Advanced Materials Research 805-806 (September 2013): 980–84. http://dx.doi.org/10.4028/www.scientific.net/amr.805-806.980.

Full text
Abstract:
Information and cyber security of Industrial Control Systems (ICS) faces severe challenges and has gained considerable importance. Information security assessment is an essential component of information security assurance infrastructure mechanisms. First, a hierarchical model of smart grid was abstracted. Based on the proposed model and the information security risks and information security protection demands of power control systems, an information security assessments framework for power control systems was proposed in dimensions of system layers and life cycle to guide the security assess
APA, Harvard, Vancouver, ISO, and other styles
3

Al Ketbi, Maitha, Khaled Shuaib, Ezedin Barka, and Marton Gergely. "Establishing a Security Control Framework for Blockchain Technology." Interdisciplinary Journal of Information, Knowledge, and Management 16 (2021): 307–30. http://dx.doi.org/10.28945/4837.

Full text
Abstract:
Aim/Purpose: The aim of this paper is to propose a new information security controls framework for blockchain technology, which is currently absent from the National and International Information Security Standards. Background: Blockchain technology is a secure and relatively new technology of distributed digital ledgers, which is based on inter-linked blocks of transactions, providing great benefits such as decentralization, transparency, immutability, and automation. There is a rapid growth in the adoption of blockchain technology in different solutions and applications and within different
APA, Harvard, Vancouver, ISO, and other styles
4

Abdulrahman, H. Altalhi1 Zailani Mohamed Sidek2 Norjihan Abdul Ghani3 Fazidah Othman4 and Maged Abdelkhaleq Al-Sheshtawil5. "ENHANCING THE SECURITY FRAMEWORK SECURECLOUD WITH THE SWIFT IDENTITY MANAGEMENT FRAMEWORK." International Journal on Cloud Computing: Services and Architecture(IJCCSA) 2, February (2018): 01–07. https://doi.org/10.5281/zenodo.1444289.

Full text
Abstract:
SecureCloud is a comprehensive security framework for cloud computing environments consisting of different modules that handle the security and trust issues of key components. One of the modules is responsible for authentication and identity management (IDM). In SecureCloud, the author suggest, to implement the security solution for the Authentication and IDM module, it is important to ensure IDM services in the cloud can be integrated with the existing IDM framework. Existing techniques for use of pseudonyms and accommodating multiple identities to protect users’ privacy can help build
APA, Harvard, Vancouver, ISO, and other styles
5

Ji, Kaining, Yitian Liu, and Changju Hu. "Design of Security Control Framework for Power System Microservices." Advances in Engineering Technology Research 13, no. 1 (2025): 777. https://doi.org/10.56028/aetr.13.1.777.2025.

Full text
Abstract:
With the development of power system, the data complexity and function hybridity of business system are getting higher, which brings new challenges to the traditional microservices security system of business system. In order to meet the large-scale API interface authorization requirements of the business system, improve the sensitivity of the security system to abnormal traffic, and enhance the system's ability to determine the source of the exception and trace the audit, this paper proposes a microservices security control framework to deal with complex business systems. Using Netty as the u
APA, Harvard, Vancouver, ISO, and other styles
6

Kumar, Anurag, and Prof Bibha Kumari. "Implementing Privacy Preserving Techniques in Distributed Big Data Framework on Cloud Computing." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 008 (2024): 1–14. http://dx.doi.org/10.55041/ijsrem37051.

Full text
Abstract:
Cloud-based deployment architectures have emerged as the preferred model for Big Data operations due to their scalability, flexibility, and cost-effectiveness. However, this shift raises new security concerns as data is no longer directly under the user's control. Securing Big Data in cloud environments is crucial for widespread adoption, but developing a comprehensive security plan is challenging without a thorough analysis of potential vulnerabilities.To address this, a novel security-by-design framework for Big Data deployment on cloud computing, termed Big Cloud, is proposed in this articl
APA, Harvard, Vancouver, ISO, and other styles
7

Yogesh Kumar Bhardwaj. "Securing Generative AI: Navigating Data Security Challenges in the AI Era." Journal of Computer Science and Technology Studies 7, no. 4 (2025): 147–55. https://doi.org/10.32996/jcsts.2025.7.4.17.

Full text
Abstract:
This article examines the evolving security landscape for Generative Artificial Intelligence (GenAI) systems as they become increasingly integrated across critical sectors including healthcare, finance, and transportation. The proliferation of these technologies creates both transformative opportunities and significant security challenges that require specialized approaches. It explores key security vulnerabilities unique to GenAI implementations, including data protection vulnerabilities, access control complexities, data anonymization gaps, model integrity risks, monitoring challenges, intel
APA, Harvard, Vancouver, ISO, and other styles
8

Alshammari, Ahmad. "A Novel Security Framework to Mitigate and Avoid Unexpected Security Threats in Saudi Arabia." Engineering, Technology & Applied Science Research 13, no. 4 (2023): 11445–50. http://dx.doi.org/10.48084/etasr.6091.

Full text
Abstract:
Many organizations around the world suffer large losses due to unexpected risks which can have a profound impact on their survival. This paper presents a novel security framework to address the security needs of Saudi organizations. There are four stages in the security framework: risk assessment and management, security intelligence and analytics, security policies and procedures, and security monitoring. A comprehensive security solution was provided by combining common security frameworks, e.g. ISO/IEC 27001:2013, NIST Cybersecurity Framework, and COBIT. The developed framework was designed
APA, Harvard, Vancouver, ISO, and other styles
9

Xu, Mudi, Benfeng Chen, Zhizhong Tan, et al. "AHAC: Advanced Network-Hiding Access Control Framework." Applied Sciences 14, no. 13 (2024): 5593. http://dx.doi.org/10.3390/app14135593.

Full text
Abstract:
In the current context of rapid Internet of Things (IoT) and cloud computing technology development, the Single Packet Authorization (SPA) protocol faces increasing challenges, such as security threats from Distributed Denial of Service (DDoS) attacks. To address these issues, we propose the Advanced Network-Hiding Access Control (AHAC) framework, designed to enhance security by reducing network environment exposure and providing secure access methods. AHAC introduces an independent control surface as the access proxy service and combines it with a noise generation mechanism for encrypted acce
APA, Harvard, Vancouver, ISO, and other styles
10

Kalwani, Seema. "Quality Framework, Principles, control practices, benchmark, internal controls addressing needs of current world." International Journal of Multidisciplinary Research and Growth Evaluation 2, no. 4 (2021): 919–26. https://doi.org/10.54660/.ijmrge.2021.2.4.919-926.

Full text
Abstract:
The article provides overview of Quality Assurance and Improvement Program. Describing quality 4.0 principles, tools, value propositions, quality management, planning, metrics and measurement used as benchmark to keep a check and continuously improve quality of work, products, processes. Internal control and security used by management, IT security, financial, accounting, and operational teams to meet their goals are discussed.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Security control framework"

1

Viljoen, Melanie. "A framework towards effective control in information security governance." Thesis, Nelson Mandela Metropolitan University, 2009. http://hdl.handle.net/10948/887.

Full text
Abstract:
The importance of information in business today has made the need to properly secure this asset evident. Information security has become a responsibility for all managers of an organization. To better support more efficient management of information security, timely information security management information should be made available to all managers. Smaller organizations face special challenges with regard to information security management and reporting due to limited resources (Ross, 2008). This dissertation discusses a Framework for Information Security Management Information (FISMI) that
APA, Harvard, Vancouver, ISO, and other styles
2

Benjuma, Nuria Mahmud. "An educational framework to support industrial control system security engineering." Thesis, De Montfort University, 2017. http://hdl.handle.net/2086/15494.

Full text
Abstract:
Industrial Control Systems (ICSs) are used to monitor and control critical infrastructure such as electricity and water. ICS were originally stand-alone systems, but are now widely being connected to corporate national IT networks, making remote monitoring and more timely control possible. While this connectivity has brought multiple benefits to ICS, such as cost reductions and an increase in redundancy and flexibility, ICS were not designed for open connectivity and therefore are more prone to security threats, creating a greater requirement for adequate security engineering approaches. The c
APA, Harvard, Vancouver, ISO, and other styles
3

Huang, Qing. "An extension to the Android access control framework." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-73064.

Full text
Abstract:
Several nice hardware functionalities located at the low level of operating system onmobile phones could be utilized in a better way if they are available to applicationdevelopers. With their help, developers are able to bring overall user experienceto a new level in terms of developing novel applications. For instance, one of thosehardware functionalities, SIM-card authentication is able to offer stronger andmore convenient way of authentication when compared to the traditional approach.Replacing the username-password combination with the SIM-card authentication,users are freed from memorizin
APA, Harvard, Vancouver, ISO, and other styles
4

Okere, Irene Onyekachi. "A control framework for the assessment of information security culture." Thesis, Nelson Mandela Metropolitan University, 2013. http://hdl.handle.net/10948/d1019861.

Full text
Abstract:
The modern organisation relies heavily on information to function effectively. With such reliance on information, it is vital that information be protected from both internal (employees) and external threats. The protection of information or information security to a large extent depends on the behaviour of humans (employees) in the organisation. The behaviour of employees is one of the top information security issues facing organisations as the human factor is regarded as the weakest link in the security chain. To address this human factor many researchers have suggested the fostering of a cu
APA, Harvard, Vancouver, ISO, and other styles
5

Marin, Luis Franco. "SELinux policy management framework for HIS." Thesis, Queensland University of Technology, 2008. https://eprints.qut.edu.au/26358/1/Luis_Franco_Thesis.pdf.

Full text
Abstract:
Health Information Systems (HIS) make extensive use of Information and Communication Technologies (ICT). The use of ICT aids in improving the quality and efficiency of healthcare services by making healthcare information available at the point of care (Goldstein, Groen, Ponkshe, and Wine, 2007). The increasing availability of healthcare data presents security and privacy issues which have not yet been fully addressed (Liu, Caelli, May, and Croll, 2008a). Healthcare organisations have to comply with the security and privacy requirements stated in laws, regulations and ethical standards, while m
APA, Harvard, Vancouver, ISO, and other styles
6

Marin, Luis Franco. "SELinux policy management framework for HIS." Queensland University of Technology, 2008. http://eprints.qut.edu.au/26358/.

Full text
Abstract:
Health Information Systems (HIS) make extensive use of Information and Communication Technologies (ICT). The use of ICT aids in improving the quality and efficiency of healthcare services by making healthcare information available at the point of care (Goldstein, Groen, Ponkshe, and Wine, 2007). The increasing availability of healthcare data presents security and privacy issues which have not yet been fully addressed (Liu, Caelli, May, and Croll, 2008a). Healthcare organisations have to comply with the security and privacy requirements stated in laws, regulations and ethical standards, while m
APA, Harvard, Vancouver, ISO, and other styles
7

Runsewe, Olubisi Atinuke. "A Policy-Based Management Framework for Cloud Computing Security." Thesis, Université d'Ottawa / University of Ottawa, 2014. http://hdl.handle.net/10393/31503.

Full text
Abstract:
Cloud Computing has changed how computing is done as applications and services are being consumed from the cloud. It has attracted a lot of attention in recent times due to the opportunities it offers. While Cloud Computing is economical, the security challenges it poses are quite significant and this has affected the adoption rate of the technology. With the potential vulnerabilities being introduced by moving data to the cloud, it has become imperative for cloud service providers to guarantee the security of information, leaving cloud service consumers (e.g., enterprises) with the task of ne
APA, Harvard, Vancouver, ISO, and other styles
8

Radhakrishnan, Sakthi Vignesh. "A framework for system fingerprinting." Thesis, Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/47609.

Full text
Abstract:
The primary objective of the proposed research is to develop a framework for smart and robust fingerprinting of networked systems. Many fingerprinting techniques have been proposed in the past, however most of these techniques are designed for a specific purpose, such as Operating System (OS) fingerprinting, Access Point (AP) fingerprinting, etc. Such standalone techniques often have limitations which render them dysfunctional in certain scenarios or against certain counter measures. In order to overcome such limitations, we propose a fingerprinting framework that can combine multiple fingerpr
APA, Harvard, Vancouver, ISO, and other styles
9

Klosinski, Vance J. "Population and resource control measures a conceptual framework for understanding and implementation." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Dec/09Dec%5FKlosinski.pdf.

Full text
Abstract:
Thesis (M.S. in Defense Analysis)--Naval Postgraduate School, December 2009.<br>Thesis Advisor(s): Simmons, Anna. Second Reader: Lee, Doowan. "December 2009." Description based on title screen as viewed on January 27, 2010. Author(s) subject terms: Population and resource control measures, Population control, Counterinsurgency, COIN, Populationcentric COIN, Social control, Social movement theory. Includes bibliographical references (p. 51-53). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
10

Nyeem, Hussain Md Abu. "A digital watermarking framework with application to medical image security." Thesis, Queensland University of Technology, 2014. https://eprints.qut.edu.au/74749/1/Hussain%20Md%20Abu_Nyeem_Thesis.pdf.

Full text
Abstract:
Dealing with digital medical images is raising many new security problems with legal and ethical complexities for local archiving and distant medical services. These include image retention and fraud, distrust and invasion of privacy. This project was a significant step forward in developing a complete framework for systematically designing, analyzing, and applying digital watermarking, with a particular focus on medical image security. A formal generic watermarking model, three new attack models, and an efficient watermarking technique for medical images were developed. These outcomes contrib
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Security control framework"

1

Victoria. Office of the Auditor-General. WoVG information security management framework. Victorian Government Printer, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Timothy, Edmunds, and Germann Wilhelm N. 1941-, eds. Towards security sector reform in post Cold War Europe: A framework for assessment. Nomos, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ottawa Verification Symposium (15th 1998 Montebello, Québec). Arms control and the rule of law: A framework for peace and security in outer space : proceedings of the Fifteenth Annual Ottawa NACD Verification Symposium. Centre for International and Security Studies, York University, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Marshall, Beier J., Mataija Steven, and York Centre for International and Strategic Studies., eds. Arms control and the rule of law: A framework for peace and security in outer space : proceedings of the Fifteenth Annual Ottawa NACD Verification Symposium. Centre for International and Security Studies, York University, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Nemati, Hamid R. Privacy solutions and security frameworks in information protection. Information Science Reference, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Office, General Accounting. Defense inventory: Improved management framework needed to guide Army best practice initiatives : report to congressional committees. The Office, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Office, General Accounting. Defense inventory: Improved management framework needed to guide Navy best practice initiatives : report to congressional committees. The Office, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Office, General Accounting. Defense inventory: Improved management framework needed to guide Army best practice initiatives : report to Congressional committees. The Office, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Office, General Accounting. Defense inventory: DOD could improve Total Asset Visibility initiative with Results Act framework : report to Congressional requesters. The Office, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Office, General Accounting. Defense inventory: Improved management framework needed to guide Air Force best practice initiatives : report to congressional committees. The Office, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Security control framework"

1

Tikk-Ringas, Eneken. "Legal Framework of Cyber Security." In Intelligent Systems, Control and Automation: Science and Engineering. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18302-2_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Nabhen, Ricardo, Edgard Jamhour, and Carlos Maziero. "A Policy Based Framework for Access Control." In Information and Communications Security. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-39927-8_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kayes, A. S. M., Jun Han, and Alan Colman. "ICAF: A Context-Aware Framework for Access Control." In Information Security and Privacy. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31448-3_34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Posthumus, Shaun, and Rossouw von Solms. "A Responsibility Framework for Information Security." In Security Management, Integrity, and Internal Control in Information Systems. Springer US, 2005. http://dx.doi.org/10.1007/0-387-31167-x_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Shiping, Duminda Wijesekera, and Sushil Jajodia. "FlexFlow: A Flexible Flow Control Policy Specification Framework." In Data and Applications Security XVII. Springer US, 2004. http://dx.doi.org/10.1007/1-4020-8070-0_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Maity, Soumya, and Soumya K. Ghosh. "A Cognitive Trust Model for Access Control Framework in MANET." In Information Systems Security. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35130-3_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chau, Ngoc-Tu, Minh-Duong Nguyen, Seungwook Jung, and Souhwan Jung. "SecaaS Framework and Architecture: A Design of Dynamic Packet Control." In Information Security Applications. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-15087-1_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zhu, Quanyan, and Zhiheng Xu. "A Game Framework to Secure Control of CBTC Systems." In Advances in Information Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-60251-2_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gow, James, and Ivan Zverzžhanovski. "Rules: The Legal and Institutional Framework for Democratic Control." In Security, Democracy and War Crimes. Palgrave Macmillan UK, 2013. http://dx.doi.org/10.1057/9781137276148_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Crampton, Jason, and Michael Huth. "Towards an Access-Control Framework for Countering Insider Threats." In Insider Threats in Cyber Security. Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-7133-3_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Security control framework"

1

Zhang, Jianhong, and Jie Wei. "On the security of NDN's privacy access control framework." In International Conference on Network Communication and Information Security (ICNCIS 2024), edited by Pascal Lorenz and Ljiljana Trajkovic. SPIE, 2025. https://doi.org/10.1117/12.3051997.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sharma, Cheshta, and Tripti Sharma. "Effective Adaptable Framework for Security of IoT Devices." In 2024 International Conference on Communication, Control, and Intelligent Systems (CCIS). IEEE, 2024. https://doi.org/10.1109/ccis63231.2024.10932056.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Dangwal, Pushkar, Sumit Yadav, and Bharat Bhushan. "Prescriptive Security Framework for Managing risks and Quantifying Security in Software Development Practices." In 2024 International Conference on Communication, Control, and Intelligent Systems (CCIS). IEEE, 2024. https://doi.org/10.1109/ccis63231.2024.10931938.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Yaqin, Peilin Lan, Bo Hu, Shiqi Li, Guimin Meng, and Xinyu Gai. "A New Security Framework Towards 5G Enabled Industrial Control System." In 2023 International Conference on Information Processing and Network Provisioning (ICIPNP). IEEE, 2023. https://doi.org/10.1109/icipnp62754.2023.00049.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

K, Darshan, Rohan P, and Narendran Sobanapuram Muruganandam. "Machine Learning based Security Enhancement Framework for Software Defined Networks." In 2024 International Conference on Control, Computing, Communication and Materials (ICCCCM). IEEE, 2024. https://doi.org/10.1109/iccccm61016.2024.11039933.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, Jingzhao, Yu Fan, and Tengfei Li. "QDGM: A Framework of Detection and Performance Evaluation for Industrial CPS Security." In 2024 43rd Chinese Control Conference (CCC). IEEE, 2024. http://dx.doi.org/10.23919/ccc63176.2024.10661768.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Berhe, Abraham Belay, Ki-Hyung Kim, and Gebere Akele Tizazu. "Industrial control system security framework for ethiopia." In 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN). IEEE, 2017. http://dx.doi.org/10.1109/icufn.2017.7993912.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Aftab, Farooq, Shaldon Leparan Suntu, and Zhongshan Zhang. "Self-Organized Security Framework for WiGig WLAN against Attacks and Threats." In 2018 13th APCA International Conference on Automatic Control and Soft Computing (CONTROLO). IEEE, 2018. http://dx.doi.org/10.1109/controlo.2018.8439750.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Marina, Ninoslav, Aneta Velkoska, Natasha Paunkoska, and Ljupcho Baleski. "Security in Twin-code framework." In 2015 7th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT). IEEE, 2015. http://dx.doi.org/10.1109/icumt.2015.7382437.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

M, Tony Aby Varkey, Mir Adil, and Swati Singh. "loT Security Enhancement: A Cybersecurity Framework." In 2023 International Conference on Power Energy, Environment & Intelligent Control (PEEIC). IEEE, 2023. http://dx.doi.org/10.1109/peeic59336.2023.10450442.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Security control framework"

1

Wayne F. Boyer and Miles A. McQueen. Primer Control System Cyber Security Framework and Technical Metrics. Office of Scientific and Technical Information (OSTI), 2008. http://dx.doi.org/10.2172/935471.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Robert P. Evans. Control Systems Security Center Comparison Study of Industrial Control System Standards against the Control Systems Protection Framework Cyber-Security Requirements. Office of Scientific and Technical Information (OSTI), 2005. http://dx.doi.org/10.2172/911771.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Basbugoglu, Tarik, Roland Fazekas, and Marcus Nicolson. Security Forces Radicalisation Report. Glasgow Caledonian University, 2025. https://doi.org/10.59019/xqhnf105.

Full text
Abstract:
The structure of this report begins with the introduction. The second section introduces the concept of Democratic Control of Armed Forces. The third section examines the theoretical framework and methodology. The fourth part explains how political elites tackle radicalization within the armed forces (training programs etc.). The fifth underscores how political elites perceived threat of radicalization in each country. The fifth underlines the constitutional background of armed forces and judicial implications that seek to prevent the radicalization and extremism within the military. The sixth
APA, Harvard, Vancouver, ISO, and other styles
4

Long, Michael, Daniel Bush, Stephen Briggs, et al. An Army guide to navigating the cyber security process for Facility Related Control Systems : cybersecurity and risk management framework explanations for the real world. Engineer Research and Development Center (U.S.), 2020. http://dx.doi.org/10.21079/11681/35294.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Meijer, Karen, and Ann-Sophie Böhle. Climate change adaptation in areas beyond government control: Opportunities and limitations. Stockholm International Peace Research Institute, 2024. http://dx.doi.org/10.55163/rqks8098.

Full text
Abstract:
Areas beyond government control constitute a highly diverse subgroup of fragile and conflict-affected settings. As a result of conflict and weak governance, many of these areas have become more vulnerable to climate change, and their communities have been left with limited capacity to respond to changing climatic conditions and extreme weather events. These settings pose unique challenges for external engagement and have, therefore, long been overlooked in adaptation efforts. This SIPRI Insights on Peace and Security explores both opportunities for and limitations of climate change adaptation
APA, Harvard, Vancouver, ISO, and other styles
6

Erästö, Tytti. Clearing the Path for Nuclear Disarmament: Confidence-building in the Korean Peninsula. Stockholm International Peace Research Institute, 2025. https://doi.org/10.55163/oydm2762.

Full text
Abstract:
This paper explores possibilities for building confidence in the Korean peninsula to address the conflict dynamics and militarization in the region. It argues that a key reason for the failure of past diplomatic efforts has been the coercive approach in pursuit of immediate nuclear disarmament in North Korea. In addition to a more incremental approach to North Korean–United States nuclear diplomacy focused on arms control, the paper highlights the need for reciprocity in terms of sanctions relief, as well as more robust confidence-building measures aimed at reducing instability and addressing
APA, Harvard, Vancouver, ISO, and other styles
7

Burniske, Jessica, Dustin Lewis, and Naz Modirzadeh. Suppressing Foreign Terrorist Fighters and Supporting Principled Humanitarian Action: A Provisional Framework for Analyzing State Practice. Harvard Law School Program on International Law and Armed Conflict, 2015. http://dx.doi.org/10.54813/nrmd2833.

Full text
Abstract:
In 2014, reports suggested that a surge of foreign jihadists were participating in armed conflicts in Syria, Iraq, and elsewhere. The United Nations Security Council responded by imposing in Resolution 2178 (2014) an array of obligations on member states to counter the threat posed by “foreign terrorist fighters” (FTFs). In the intervening year, those states have taken a range of actions — though at various speeds and with varying levels of commitment — to implement the FTF obligations imposed by the Council. Meanwhile, many states continue to fund and otherwise throw their support behind life
APA, Harvard, Vancouver, ISO, and other styles
8

Lewis, Dustin, Radhika Kapoor, and Naz Modirzadeh. Advancing Humanitarian Commitments in Connection with Countering Terrorism: Exploring a Foundational Reframing concerning the Security Council. Harvard Law School Program on International Law and Armed Conflict, 2021. http://dx.doi.org/10.54813/uzav2714.

Full text
Abstract:
The imperative to provide humanitarian and medical services on an urgent basis in armed conflicts is anchored in moral tenets, shared values, and international rules. States spend tens of billions of dollars each year to help implement humanitarian programs in conflicts across the world. Yet, in practice, counterterrorism objectives increasingly prevail over humanitarian concerns, often resulting in devastating effects for civilian populations in need of aid and protection in war. Not least, confusion and misapprehensions about the power and authority of States relative to the United Nations S
APA, Harvard, Vancouver, ISO, and other styles
9

Bajon, Theò. Weapons and Ammunition Management Country Insight: Republic of Côte d’Ivoire. UNIDIR, 2025. https://doi.org/10.37559/caap/25/wam/06.

Full text
Abstract:
UNIDIR defines weapons and ammunition management (WAM) in a comprehensive manner covering the oversight, accountability and governance of conventional arms and ammunition throughout their management cycle. This includes the establishment of relevant national frameworks, processes and practices for the safe and secure production and acquisition of materiel, stockpiling, transfers, end use control, tracing and disposal. This holistic approach is essential in ensuring that efforts to better regulate arms and ammunition are undertaken in alignment with relevant humanitarian, peacebuilding, securit
APA, Harvard, Vancouver, ISO, and other styles
10

Ragozin, Konstantin. High-tech ecosystem in construction. Intellectual Archive, 2024. http://dx.doi.org/10.32370/iaj.3187.

Full text
Abstract:
The issues of ensuring the stability and safety of energy generating equipment, including through various innovative aspects of cyber security, are currently extremely relevant; Energy equipment when used within the framework of construction projects is quite autonomous and issues of operational management and online control can be fully resolved within the capacity of their internal processors and controllers. In many cases, issues of computer modeling of the operating cycle parameters of such equipment, with the correct and economical formulation of the problem, can also be solved using the
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!