Academic literature on the topic 'Security systems'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security systems.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Security systems"

1

Dudykevyc, Valeriy, Galyna Mykytyn, Taras Kret, and Andrii Rebets. "Security of Cyber-Physical Systems from Concept to Complex Information Security System." Advances in Cyber-Physical Systems 1, no. 2 (February 23, 2016): 67–75. http://dx.doi.org/10.23939/acps2016.02.067.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Macleod, Ian. "Security Systems." Expository Times 100, no. 10 (July 1989): 382–83. http://dx.doi.org/10.1177/001452468910001010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sharkov, George. "A System-of-Systems Approach to Cyber Security and Resilience." Information & Security: An International Journal 37 (2017): 69–94. http://dx.doi.org/10.11610/isij.3706.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jahankhani, Hamid, Shantha Fernando, Mathews Z. Nkhoma, and Haralambos Mouratidis. "Information Systems Security." International Journal of Information Security and Privacy 1, no. 3 (July 2007): 13–25. http://dx.doi.org/10.4018/jisp.2007070102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Everett, H. R. "Robotics security systems." IEEE Instrumentation & Measurement Magazine 6, no. 4 (December 2003): 30–34. http://dx.doi.org/10.1109/mim.2003.1251480.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Stapley, Gerry. "Intelligent security systems." Property Management 4, no. 4 (April 1986): 328–31. http://dx.doi.org/10.1108/eb006636.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Eckert, Claudia. "Embedded systems security." Datenschutz und Datensicherheit - DuD 36, no. 12 (November 24, 2012): 861. http://dx.doi.org/10.1007/s11623-012-0289-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

kumar, Amit, and Sunita Sangwan. "Biometric Security Systems." International Journal of Engineering Trends and Technology 11, no. 4 (May 25, 2014): 169–70. http://dx.doi.org/10.14445/22315381/ijett-v11p233.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bayuk, Jennifer L. "Systems Security Engineering." IEEE Security & Privacy Magazine 9, no. 2 (March 2011): 72–74. http://dx.doi.org/10.1109/msp.2011.41.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sherman, Robin L. "Distributed systems security." Computers & Security 11, no. 1 (March 1992): 24–28. http://dx.doi.org/10.1016/0167-4048(92)90216-e.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Security systems"

1

He, Ying. "Generic security templates for information system security arguments : mapping security arguments within healthcare systems." Thesis, University of Glasgow, 2014. http://theses.gla.ac.uk/5773/.

Full text
Abstract:
Industry reports indicate that the number of security incidents happened in healthcare organisation is increasing. Lessons learned (i.e. the causes of a security incident and the recommendations intended to avoid any recurrence) from those security incidents should ideally inform information security management systems (ISMS). The sharing of the lessons learned is an essential activity in the “follow-up” phase of security incident response lifecycle, which has long been addressed but not given enough attention in academic and industry. This dissertation proposes a novel approach, the Generic Security Template (GST), aiming to feed back the lessons learned from real world security incidents to the ISMS. It adapts graphical Goal Structuring Notations (GSN), to present the lessons learned in a structured manner through mapping them to the security requirements of the ISMS. The suitability of the GST has been confirmed by demonstrating that instances of the GST can be produced from real world security incidents of different countries based on in-depth analysis of case studies. The usability of the GST has been evaluated using a series of empirical studies. The GST is empirically evaluated in terms of its given effectiveness in assisting the communication of the lessons learned from security incidents as compared to the traditional text based approach alone. The results show that the GST can help to improve the accuracy and reduce the mental efforts in assisting the identification of the lessons learned from security incidents and the results are statistically significant. The GST is further evaluated to determine whether users can apply the GST to structure insights derived from a specific security incident. The results show that students with a computer science background can create an instance of the GST. The acceptability of the GST is assessed in a healthcare organisation. Strengths and weaknesses are identified and the GST has been adjusted to fit into organisational needs. The GST is then further tested to examine its capability to feed back the security lessons to the ISMS. The results show that, by using the GST, lessons identified from security incidents from one healthcare organisation in a specific country can be transferred to another and can indeed inform the improvements of the ISMS. In summary, the GST provides a unified way to feed back the lessons learned to the ISMS. It fosters an environment where different stakeholders can speak the same language while exchanging the lessons learned from the security incidents around the world.
APA, Harvard, Vancouver, ISO, and other styles
2

Antonsson, Martin. "Securing XML Web Services : using WS-security." Thesis, University West, Department of Informatics and Mathematics, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-580.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Крапивний, Іван Васильович, Иван Васильевич Крапивный, Ivan Vasylovych Krapyvnyi, Віталій Анатолійович Омельяненко, Виталий Анатольевич Омельяненко, Vitalii Anatoliiovych Omelianenko, and V. O. Varakin. "Information security economic systems in national security country." Thesis, Sumy State University, 2015. http://essuir.sumdu.edu.ua/handle/123456789/43592.

Full text
Abstract:
In today's world, information security becomes vital for ensuring the interests of man, society and the state and the most important, part of the whole system of national security. Doctrine considers all the work in the field of information based on the Concept of National Security of Ukraine. The doctrine identifies four main components of Ukraine's national interests in the information sphere.
APA, Harvard, Vancouver, ISO, and other styles
4

Benzina, Hedi. "Enforcing virtualized systems security." Phd thesis, École normale supérieure de Cachan - ENS Cachan, 2012. http://tel.archives-ouvertes.fr/tel-00846513.

Full text
Abstract:
Virtual machine technology is rapidly gaining acceptance as a fundamental building block in enterprise data centers. It is most known for improving efficiency and ease of management. However, the central issue of this technology is security. We propose in this thesis to enforce the security of virtualized systems and introduce new approaches that deal with different security aspects related not only to the technology itself but also to its deployment and maintenance. We first propose a new architecture that offers real-time supervision of a complete virtualized architecture. The idea is to implement decentralized supervision on one single physical host. We study the advantages and the limits of this architecture and show that it is unable to react according to some new stealthy attacks. As a remedy, we introduce a new procedure that permits to secure the sensitive resources of a virtualized system and make sure that families of attacks can not be run at all. We introduce a variant of the LTL language with new past operators and show how policies written in this language can be easily translated to attack signatures that we use to detect attacks on the system. We also analyse the impact that an insecure network communication between virtual machines can have on the global security of the virtualized system. We propose a multilevel security policy model that covers almost all the network operations that can be performed by a virtual machine. We also deal with some management operations and introduce the related constraints that must be satisfied when an operation is performed.
APA, Harvard, Vancouver, ISO, and other styles
5

Ismail, Roslan. "Security of reputation systems." Thesis, Queensland University of Technology, 2004. https://eprints.qut.edu.au/15964/1/Roslan_Ismail_Thesis.pdf.

Full text
Abstract:
Reputation systems have the potential of improving the quality of on-line markets by identifying fraudulent users and subsequently dealing with these users can be prevented. The behaviour of participants involved in e-commerce can be recorded and then this information made available to potential transaction partners to make decisions to choose a suitable counterpart. Unfortunately current reputation systems suffer from various vulnerabilities. Solutions for many of these problems will be discussed. One of the major threats is that of unfair feedback. A large number of negative or positive feedbacks could be submitted to a particular user with the aim to either downgrade or upgrade the user's reputation. As a result the produced reputation does not reflect the user's true trustworthiness. To overcome this threat a variation of Bayesian Reputation system is proposed. The proposed scheme is based on the subjective logic framework proposed Josang et al. [65]. The impact of unfair feedback is countered through some systematic approaches proposed in the scheme. Lack of anonymity for participants leads to reluctance to provide negative feedback. A novel solution for anonymity of feedback providers is proposed to allow participants to provide negative feedback when appropriate without fear of retaliation. The solution is based on several primitive cryptographic mechanisms; e-cash, designated verifier proof and knowledge proof. In some settings it is desirable for the reputation owner to control the distribution of its own reputation and to disclose this at its discretion to the intended parties. To realize this, a solution based on a certificate mechanism is proposed. This solution allows the reputation owner to keep the certificate and to distribute its reputation while not being able to alter that information without detection. The proposed solutions cater for two modes of reputation systems: centralised and decentralised. The provision of an off-line reputation system is discussed by proposing a new solution using certificates. This is achieved through the delegation concept and a variant of digital signature schemes known as proxy signatures. The thesis presents a security architecture of reputation systems which consists of different elements to safeguard reputation systems from malicious activities. Elements incorporated into this architecture include privacy, verifiability and availability. The architecture also introduces Bayesian approach to counter security threat posed by reputation systems. This means the proposed security architecture in the thesis is a combination of two prominent approaches, namely, Bayesian and cryptographic, to provide security for reputation systems. The proposed security architecture can be used as a basic framework for further development in identifying and incorporating required elements so that a total security solution for reputation systems can be achieved.
APA, Harvard, Vancouver, ISO, and other styles
6

Ismail, Roslan. "Security of reputation systems." Queensland University of Technology, 2004. http://eprints.qut.edu.au/15964/.

Full text
Abstract:
Reputation systems have the potential of improving the quality of on-line markets by identifying fraudulent users and subsequently dealing with these users can be prevented. The behaviour of participants involved in e-commerce can be recorded and then this information made available to potential transaction partners to make decisions to choose a suitable counterpart. Unfortunately current reputation systems suffer from various vulnerabilities. Solutions for many of these problems will be discussed. One of the major threats is that of unfair feedback. A large number of negative or positive feedbacks could be submitted to a particular user with the aim to either downgrade or upgrade the user's reputation. As a result the produced reputation does not reflect the user's true trustworthiness. To overcome this threat a variation of Bayesian Reputation system is proposed. The proposed scheme is based on the subjective logic framework proposed Josang et al. [65]. The impact of unfair feedback is countered through some systematic approaches proposed in the scheme. Lack of anonymity for participants leads to reluctance to provide negative feedback. A novel solution for anonymity of feedback providers is proposed to allow participants to provide negative feedback when appropriate without fear of retaliation. The solution is based on several primitive cryptographic mechanisms; e-cash, designated verifier proof and knowledge proof. In some settings it is desirable for the reputation owner to control the distribution of its own reputation and to disclose this at its discretion to the intended parties. To realize this, a solution based on a certificate mechanism is proposed. This solution allows the reputation owner to keep the certificate and to distribute its reputation while not being able to alter that information without detection. The proposed solutions cater for two modes of reputation systems: centralised and decentralised. The provision of an off-line reputation system is discussed by proposing a new solution using certificates. This is achieved through the delegation concept and a variant of digital signature schemes known as proxy signatures. The thesis presents a security architecture of reputation systems which consists of different elements to safeguard reputation systems from malicious activities. Elements incorporated into this architecture include privacy, verifiability and availability. The architecture also introduces Bayesian approach to counter security threat posed by reputation systems. This means the proposed security architecture in the thesis is a combination of two prominent approaches, namely, Bayesian and cryptographic, to provide security for reputation systems. The proposed security architecture can be used as a basic framework for further development in identifying and incorporating required elements so that a total security solution for reputation systems can be achieved.
APA, Harvard, Vancouver, ISO, and other styles
7

Thulnoon, A. A. T. "Efficient runtime security system for decentralised distributed systems." Thesis, Liverpool John Moores University, 2018. http://researchonline.ljmu.ac.uk/9043/.

Full text
Abstract:
Distributed systems can be defined as systems that are scattered over geographical distances and provide different activities through communication, processing, data transfer and so on. Thus, increasing the cooperation, efficiency, and reliability to deal with users and data resources jointly. For this reason, distributed systems have been shown to be a promising infrastructure for most applications in the digital world. Despite their advantages, keeping these systems secure, is a complex task because of the unconventional nature of distributed systems which can produce many security problems like phishing, denial of services or eavesdropping. Therefore, adopting security and privacy policies in distributed systems will increase the trustworthiness between the users and these systems. However, adding or updating security is considered one of the most challenging concerns and this relies on various security vulnerabilities which existing in distributed systems. The most significant one is inserting or modifying a new security concern or even removing it according to the security status which may appear at runtime. Moreover, these problems will be exacerbated when the system adopts the multi-hop concept as a way to deal with transmitting and processing information. This can pose many significant security challenges especially if dealing with decentralized distributed systems and the security must be furnished as end-to-end. Unfortunately, existing solutions are insufficient to deal with these problems like CORBA which is considered a one-to-one relationship only, or DSAW which deals with end-to-end security but without taking into account the possibility of changing information sensitivity during runtime. This thesis provides a proposed mechanism for enforcing security policies and dealing with distributed systems’ security weakness in term of the software perspective. The proposed solution utilised Aspect-Oriented Programming (AOP), to address security concerns during compilation and running time. The proposed solution is based on a decentralized distributed system that adopts the multi-hop concept to deal with different requested tasks. The proposed system focused on how to achieve high accuracy, data integrity and high efficiency of the distributed system in real time. This is done through modularising the most efficient security solutions, Access Control and Cryptography, by using Aspect-Oriented Programming language. The experiments’ results show the proposed solution overcomes the shortage of the existing solutions by fully integrating with the decentralized distributed system to achieve dynamic, high cooperation, high performance and end-to-end holistic security.
APA, Harvard, Vancouver, ISO, and other styles
8

Corteggiani, Nassim. "Towards system-wide security analysis of embedded systems." Electronic Thesis or Diss., Sorbonne université, 2020. http://www.theses.fr/2020SORUS285.

Full text
Abstract:
Cette thèse se consacre à l'amélioration des techniques d'analyse dynamiques permettant la vérification de logiciels conçus pour des systèmes embarqués, couramment appelé micrologiciel. Au vu de l'augmentation significative de la connectivité des appareils électroniques, les préoccupations concernant leur sécurité s'intensifient. Les conséquences d'une faille de sécurité sur ces appareils peuvent impliquer des répercussions économiques non négligeables et des difficultés techniques importantes pour appliquer un correctif. C’est le cas notamment des amorceurs de code qui sont généralement stockés sur des mémoires mortes et intégrées dans les couches physiques qui constituent le microcontrôleur. Par conséquent, l’analyse de code source spécifique aux systèmes embarqués pendant la phase de production des micro-contrôleurs est cruciale. Cette thèse présente des techniques d'analyse afin de tester la sécurité de composants logiciel et matériel à l'échelle du système. En particulier, nous nous intéressons aux techniques de test basé sur l'émulation partielle dont nous améliorons les capacités avec trois nouvelles approches. Premièrement, Inception un outil d’analyse dynamique permettant d’appliquer des méthodes de tests exhaustifs (exécution symbolique) sur le code source de micrologiciel même lorsque ce dernier dépend de code plus bas niveau (exemple, code binaire ou assembleur). Deuxièmement, une sonde haute performance basé sur le protocol USB 3.0 afin de réduire la latence lors des communications entre l'outil d'analyse et le vrai matériel. Troisièmement, HardSnap une méthode permettant de générer des instantanés des périphériques matériel afin d'augmenter le contrôle et la visibilité lors de l'exécution symbolique. Cet outil permet de réaliser une exploration concurrente de plusieurs chemins d'exécution sans inconsistance
This thesis is dedicated to the improvement of dynamic analysis techniques allowing the verification of software designed for embedded systems, commonly called firmware. It is clear that the increasing pervasiveness and connectivity of embedded devices significantly increase their exposure to attacks. The consequences of a security issue can be dramatic not least in the economical field, but on the technical stage as well. Especially because of the difficulty to patch some devices. For instance, offline devices or code stored in a mask rom which are read only memory programmed during the chip fabrication. For all these reasons, it is important to thoughtfully test firmware program before the manufacturing process. This thesis presents analysis methods for system-wide testing of security and hardware components. In particular, we propose three impvrovements for partial emulation. First, Inception a dynamic analysis tool to test the security of firmware programs even when mixing different level of semantic (e.g., C/C++ mixed with assembly). Second, Steroids a high performance USB 3.0 probe that aims at minimizing the latency between the analyzer and the real device. Finally, HardSnap a hardware snapshotting method that offers higher visibility and control over the hardware peripherals. It enables testing concurently different execution paths without corrupting the hardware peripherals state
APA, Harvard, Vancouver, ISO, and other styles
9

Caronni, Germano. "Dynamic security in communication systems /." [S.l.] : [s.n.], 1999. http://e-collection.ethbib.ethz.ch/show?type=diss&nr=13156.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lessner, Dirk. "Network security for embedded systems /." [St. Lucia, Qld.], 2005. http://adt.library.uq.edu.au/public/adt-QU20060215.160952/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Security systems"

1

MSI. Electronic security systems. Chester: Marketing Research for Industry, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tripathy, Somanath, Rudrapatna K. Shyamasundar, and Rajiv Ranjan, eds. Information Systems Security. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-92571-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ganapathy, Vinod, Trent Jaeger, and R. K. Shyamasundar, eds. Information Systems Security. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-05171-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Prakash, Atul, and Rudrapatna Shyamasundar, eds. Information Systems Security. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13841-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Garg, Deepak, N. V. Narendra Kumar, and Rudrapatna K. Shyamasundar, eds. Information Systems Security. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-36945-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Venkatakrishnan, Venkat, and Diganta Goswami, eds. Information Systems Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35130-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ray, Indrajit, Manoj Singh Gaur, Mauro Conti, Dheeraj Sanghi, and V. Kamakoti, eds. Information Systems Security. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49806-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shyamasundar, Rudrapatna K., Virendra Singh, and Jaideep Vaidya, eds. Information Systems Security. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-72598-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jajodia, Sushil, and Chandan Mazumdar, eds. Information Systems Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25560-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Prakash, Atul, and Indranil Sen Gupta, eds. Information Systems Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10772-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Security systems"

1

Weik, Martin H. "systems security." In Computer Science and Communications Dictionary, 1726. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_18959.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lenhard, Thomas H. "Telephone Systems." In Data Security, 45–49. Wiesbaden: Springer Fachmedien Wiesbaden, 2022. http://dx.doi.org/10.1007/978-3-658-35494-7_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jaume, Mathieu. "Security Rules versus Security Properties." In Information Systems Security, 231–45. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-17714-9_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Seaman, Jim. "Information Systems Security." In Protective Security, 323–55. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6908-4_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Talarico, Luca, Kenneth Sörensen, Genserik Reniers, and Johan Springael. "Pipeline Security." In Securing Transportation Systems, 281–311. Hoboken, NJ: John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781119078203.ch15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Magnuson, J. A., and Dennis E. Leber. "Health Systems Security." In Health Informatics, 167–81. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-41215-9_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Weik, Martin H. "systems security initiative." In Computer Science and Communications Dictionary, 1726. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_18960.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Weik, Martin H. "information systems security." In Computer Science and Communications Dictionary, 779. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_8970.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bowe, Jürgen, B. Kordowski, Andreas Walther, and Jan Lichtermann. "Vehicle security systems." In Automotive Mechatronics, 488–95. Wiesbaden: Springer Fachmedien Wiesbaden, 2014. http://dx.doi.org/10.1007/978-3-658-03975-2_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tjøstheim, Thomas, Thea Peacock, and Peter Y. A. Ryan. "A Model for System-Based Analysis of Voting Systems." In Security Protocols, 114–30. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-17773-6_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Security systems"

1

Farroha, Bassam S., and Deborah L. Farroha. "Cyber security components for pervasive Enterprise Security Management and the virtualization aspects." In 2010 4th Annual IEEE Systems Conference. IEEE, 2010. http://dx.doi.org/10.1109/systems.2010.5482328.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kabbani, Nawwar, Scott Tilley, and Lewis Pearson. "Towards an evaluation framework for SOA security testing tools." In 2010 4th Annual IEEE Systems Conference. IEEE, 2010. http://dx.doi.org/10.1109/systems.2010.5482322.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hentea, Mariana. "Improving Security for SCADA Control Systems." In InSITE 2008: Informing Science + IT Education Conference. Informing Science Institute, 2008. http://dx.doi.org/10.28945/3185.

Full text
Abstract:
The continuous growth of cyber security threats and attacks including the increasing sophistication of malware is impacting the security of critical infrastructure, industrial control systems, and Supervisory Control and Data Acquisition (SCADA) control systems. The reliable operation of modern infrastructures depends on computerized systems and SCADA systems. Since the emergence of Internet and World Wide Web technologies, these systems were integrated with business systems and became more exposed to cyber threats. There is a growing concern about the security and safety of the SCADA control systems. The Presidential Decision Directive 63 document established the framework to protect the critical infrastructure and the Presidential document of 2003, the National Strategy to Secure Cyberspace stated that securing SCADA systems is a national priority. The critical infrastructure includes telecommunication, transportation, energy, banking, finance, water supply, emergency services, government services, agriculture, and other fundamental systems and services that are critical to the security, economic prosperity, and social well-being of the public. The critical infrastructure is characterized by interdependencies (physical, cyber, geographic, and logical) and complexity (collections of interacting components). Therefore, information security management principles and processes need to be applied to SCADA systems without exception. Critical infrastructure disruptions can directly and indirectly affect other infrastructures, impact large geographic regions, and send ripples throughout the national and global economy. For example, under normal operating conditions, the electric power infrastructure requires fuels (natural gas and petroleum), transportation, water, banking and finance, telecommunication, and SCADA systems for monitoring and control.
APA, Harvard, Vancouver, ISO, and other styles
4

He, Y., and C. W. Johnson. "Generic security cases for information system security in healthcare systems." In 7th IET International Conference on System Safety, incorporating the Cyber Security Conference 2012. Institution of Engineering and Technology, 2012. http://dx.doi.org/10.1049/cp.2012.1507.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Thuraisingham, Bhavani. "Multimedia systems security." In the 9th workshop. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1288869.1288870.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kolev, Ivan S., and Ivelina S. Stoeva. "Laser security systems." In Temp Symposium Entry, edited by Vladislav Y. Panchenko and Nikola V. Sabotinov. SPIE, 2004. http://dx.doi.org/10.1117/12.563122.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

ADASCALITEI, Ioan. "MOBILE SYSTEMS SECURITY." In 18th International Conference on INFORMATICS in ECONOMY. Education, Research and Business Technologies. Bucharest University of Economic Studies Press, 2019. http://dx.doi.org/10.12948/ie2019.06.05.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Dini, Gianluca, and Angelica Lo Duca. "On securing publish-subscribe systems with security groups." In 2009 IEEE Symposium on Computers and Communications (ISCC). IEEE, 2009. http://dx.doi.org/10.1109/iscc.2009.5202278.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ghonaimy, M. Adeeb. "Quantum network security." In Systems (ICCES). IEEE, 2009. http://dx.doi.org/10.1109/icces.2009.5383322.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lifeng Lai, Siu-Wai Ho, and H. Vincent Poor. "Privacy-security tradeoffs in biometric security systems." In 2008 46th Annual Allerton Conference on Communication, Control, and Computing. IEEE, 2008. http://dx.doi.org/10.1109/allerton.2008.4797566.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Security systems"

1

Bayuk, Jennifer, Dennis Barnabe, Jonathan Goodnight, Drew Hamilton, Barry Horowitz, Clifford Neuman, and Stas' Tarchalski. Systems Security Engineering. Fort Belvoir, VA: Defense Technical Information Center, August 2010. http://dx.doi.org/10.21236/ada637296.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Everett, H. R. Robotic Security Systems. Fort Belvoir, VA: Defense Technical Information Center, December 2003. http://dx.doi.org/10.21236/ada422075.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Barkley, John. Security in open systems. Gaithersburg, MD: National Institute of Standards and Technology, 1994. http://dx.doi.org/10.6028/nist.sp.800-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Faculjak, D. A. Implementing security measures for computer-based security systems. Office of Scientific and Technical Information (OSTI), February 1989. http://dx.doi.org/10.2172/6137987.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ganger, Gregory R. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security (Self-Securing Devices). Fort Belvoir, VA: Defense Technical Information Center, January 2007. http://dx.doi.org/10.21236/ada465393.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ackermann, Mark R. Trusting National Security Systems: Issues for National Security Leadership. Office of Scientific and Technical Information (OSTI), August 2014. http://dx.doi.org/10.2172/1150236.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gage, Douglas W., W. D. Bryan, and Hoa G. Nguyen. Internetting Tactical Security Sensor Systems. Fort Belvoir, VA: Defense Technical Information Center, April 1998. http://dx.doi.org/10.21236/ada422499.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Nazario, Noel. Security labels for open systems:. Gaithersburg, MD: National Institute of Standards and Technology, 1990. http://dx.doi.org/10.6028/nist.ir.4362.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Steinauer, Dennis D. Security of personal computer systems. Gaithersburg, MD: National Bureau of Standards, 1985. http://dx.doi.org/10.6028/nbs.sp.500-120.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kloske, John, and Scot T. Tripp. Advanced Underwater Port Security Systems. Fort Belvoir, VA: Defense Technical Information Center, September 2002. http://dx.doi.org/10.21236/ada626957.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography