Academic literature on the topic 'Security systems'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security systems.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security systems"
Dudykevyc, Valeriy, Galyna Mykytyn, Taras Kret, and Andrii Rebets. "Security of Cyber-Physical Systems from Concept to Complex Information Security System." Advances in Cyber-Physical Systems 1, no. 2 (February 23, 2016): 67–75. http://dx.doi.org/10.23939/acps2016.02.067.
Full textMacleod, Ian. "Security Systems." Expository Times 100, no. 10 (July 1989): 382–83. http://dx.doi.org/10.1177/001452468910001010.
Full textSharkov, George. "A System-of-Systems Approach to Cyber Security and Resilience." Information & Security: An International Journal 37 (2017): 69–94. http://dx.doi.org/10.11610/isij.3706.
Full textJahankhani, Hamid, Shantha Fernando, Mathews Z. Nkhoma, and Haralambos Mouratidis. "Information Systems Security." International Journal of Information Security and Privacy 1, no. 3 (July 2007): 13–25. http://dx.doi.org/10.4018/jisp.2007070102.
Full textEverett, H. R. "Robotics security systems." IEEE Instrumentation & Measurement Magazine 6, no. 4 (December 2003): 30–34. http://dx.doi.org/10.1109/mim.2003.1251480.
Full textStapley, Gerry. "Intelligent security systems." Property Management 4, no. 4 (April 1986): 328–31. http://dx.doi.org/10.1108/eb006636.
Full textEckert, Claudia. "Embedded systems security." Datenschutz und Datensicherheit - DuD 36, no. 12 (November 24, 2012): 861. http://dx.doi.org/10.1007/s11623-012-0289-x.
Full textkumar, Amit, and Sunita Sangwan. "Biometric Security Systems." International Journal of Engineering Trends and Technology 11, no. 4 (May 25, 2014): 169–70. http://dx.doi.org/10.14445/22315381/ijett-v11p233.
Full textBayuk, Jennifer L. "Systems Security Engineering." IEEE Security & Privacy Magazine 9, no. 2 (March 2011): 72–74. http://dx.doi.org/10.1109/msp.2011.41.
Full textSherman, Robin L. "Distributed systems security." Computers & Security 11, no. 1 (March 1992): 24–28. http://dx.doi.org/10.1016/0167-4048(92)90216-e.
Full textDissertations / Theses on the topic "Security systems"
He, Ying. "Generic security templates for information system security arguments : mapping security arguments within healthcare systems." Thesis, University of Glasgow, 2014. http://theses.gla.ac.uk/5773/.
Full textAntonsson, Martin. "Securing XML Web Services : using WS-security." Thesis, University West, Department of Informatics and Mathematics, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-580.
Full textКрапивний, Іван Васильович, Иван Васильевич Крапивный, Ivan Vasylovych Krapyvnyi, Віталій Анатолійович Омельяненко, Виталий Анатольевич Омельяненко, Vitalii Anatoliiovych Omelianenko, and V. O. Varakin. "Information security economic systems in national security country." Thesis, Sumy State University, 2015. http://essuir.sumdu.edu.ua/handle/123456789/43592.
Full textBenzina, Hedi. "Enforcing virtualized systems security." Phd thesis, École normale supérieure de Cachan - ENS Cachan, 2012. http://tel.archives-ouvertes.fr/tel-00846513.
Full textIsmail, Roslan. "Security of reputation systems." Thesis, Queensland University of Technology, 2004. https://eprints.qut.edu.au/15964/1/Roslan_Ismail_Thesis.pdf.
Full textIsmail, Roslan. "Security of reputation systems." Queensland University of Technology, 2004. http://eprints.qut.edu.au/15964/.
Full textThulnoon, A. A. T. "Efficient runtime security system for decentralised distributed systems." Thesis, Liverpool John Moores University, 2018. http://researchonline.ljmu.ac.uk/9043/.
Full textCorteggiani, Nassim. "Towards system-wide security analysis of embedded systems." Electronic Thesis or Diss., Sorbonne université, 2020. http://www.theses.fr/2020SORUS285.
Full textThis thesis is dedicated to the improvement of dynamic analysis techniques allowing the verification of software designed for embedded systems, commonly called firmware. It is clear that the increasing pervasiveness and connectivity of embedded devices significantly increase their exposure to attacks. The consequences of a security issue can be dramatic not least in the economical field, but on the technical stage as well. Especially because of the difficulty to patch some devices. For instance, offline devices or code stored in a mask rom which are read only memory programmed during the chip fabrication. For all these reasons, it is important to thoughtfully test firmware program before the manufacturing process. This thesis presents analysis methods for system-wide testing of security and hardware components. In particular, we propose three impvrovements for partial emulation. First, Inception a dynamic analysis tool to test the security of firmware programs even when mixing different level of semantic (e.g., C/C++ mixed with assembly). Second, Steroids a high performance USB 3.0 probe that aims at minimizing the latency between the analyzer and the real device. Finally, HardSnap a hardware snapshotting method that offers higher visibility and control over the hardware peripherals. It enables testing concurently different execution paths without corrupting the hardware peripherals state
Caronni, Germano. "Dynamic security in communication systems /." [S.l.] : [s.n.], 1999. http://e-collection.ethbib.ethz.ch/show?type=diss&nr=13156.
Full textLessner, Dirk. "Network security for embedded systems /." [St. Lucia, Qld.], 2005. http://adt.library.uq.edu.au/public/adt-QU20060215.160952/index.html.
Full textBooks on the topic "Security systems"
Tripathy, Somanath, Rudrapatna K. Shyamasundar, and Rajiv Ranjan, eds. Information Systems Security. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-92571-0.
Full textGanapathy, Vinod, Trent Jaeger, and R. K. Shyamasundar, eds. Information Systems Security. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-05171-6.
Full textPrakash, Atul, and Rudrapatna Shyamasundar, eds. Information Systems Security. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13841-1.
Full textGarg, Deepak, N. V. Narendra Kumar, and Rudrapatna K. Shyamasundar, eds. Information Systems Security. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-36945-3.
Full textVenkatakrishnan, Venkat, and Diganta Goswami, eds. Information Systems Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35130-3.
Full textRay, Indrajit, Manoj Singh Gaur, Mauro Conti, Dheeraj Sanghi, and V. Kamakoti, eds. Information Systems Security. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49806-5.
Full textShyamasundar, Rudrapatna K., Virendra Singh, and Jaideep Vaidya, eds. Information Systems Security. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-72598-7.
Full textJajodia, Sushil, and Chandan Mazumdar, eds. Information Systems Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25560-1.
Full textPrakash, Atul, and Indranil Sen Gupta, eds. Information Systems Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10772-6.
Full textBook chapters on the topic "Security systems"
Weik, Martin H. "systems security." In Computer Science and Communications Dictionary, 1726. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_18959.
Full textLenhard, Thomas H. "Telephone Systems." In Data Security, 45–49. Wiesbaden: Springer Fachmedien Wiesbaden, 2022. http://dx.doi.org/10.1007/978-3-658-35494-7_8.
Full textJaume, Mathieu. "Security Rules versus Security Properties." In Information Systems Security, 231–45. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-17714-9_17.
Full textSeaman, Jim. "Information Systems Security." In Protective Security, 323–55. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6908-4_8.
Full textTalarico, Luca, Kenneth Sörensen, Genserik Reniers, and Johan Springael. "Pipeline Security." In Securing Transportation Systems, 281–311. Hoboken, NJ: John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781119078203.ch15.
Full textMagnuson, J. A., and Dennis E. Leber. "Health Systems Security." In Health Informatics, 167–81. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-41215-9_10.
Full textWeik, Martin H. "systems security initiative." In Computer Science and Communications Dictionary, 1726. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_18960.
Full textWeik, Martin H. "information systems security." In Computer Science and Communications Dictionary, 779. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_8970.
Full textBowe, Jürgen, B. Kordowski, Andreas Walther, and Jan Lichtermann. "Vehicle security systems." In Automotive Mechatronics, 488–95. Wiesbaden: Springer Fachmedien Wiesbaden, 2014. http://dx.doi.org/10.1007/978-3-658-03975-2_26.
Full textTjøstheim, Thomas, Thea Peacock, and Peter Y. A. Ryan. "A Model for System-Based Analysis of Voting Systems." In Security Protocols, 114–30. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-17773-6_13.
Full textConference papers on the topic "Security systems"
Farroha, Bassam S., and Deborah L. Farroha. "Cyber security components for pervasive Enterprise Security Management and the virtualization aspects." In 2010 4th Annual IEEE Systems Conference. IEEE, 2010. http://dx.doi.org/10.1109/systems.2010.5482328.
Full textKabbani, Nawwar, Scott Tilley, and Lewis Pearson. "Towards an evaluation framework for SOA security testing tools." In 2010 4th Annual IEEE Systems Conference. IEEE, 2010. http://dx.doi.org/10.1109/systems.2010.5482322.
Full textHentea, Mariana. "Improving Security for SCADA Control Systems." In InSITE 2008: Informing Science + IT Education Conference. Informing Science Institute, 2008. http://dx.doi.org/10.28945/3185.
Full textHe, Y., and C. W. Johnson. "Generic security cases for information system security in healthcare systems." In 7th IET International Conference on System Safety, incorporating the Cyber Security Conference 2012. Institution of Engineering and Technology, 2012. http://dx.doi.org/10.1049/cp.2012.1507.
Full textThuraisingham, Bhavani. "Multimedia systems security." In the 9th workshop. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1288869.1288870.
Full textKolev, Ivan S., and Ivelina S. Stoeva. "Laser security systems." In Temp Symposium Entry, edited by Vladislav Y. Panchenko and Nikola V. Sabotinov. SPIE, 2004. http://dx.doi.org/10.1117/12.563122.
Full textADASCALITEI, Ioan. "MOBILE SYSTEMS SECURITY." In 18th International Conference on INFORMATICS in ECONOMY. Education, Research and Business Technologies. Bucharest University of Economic Studies Press, 2019. http://dx.doi.org/10.12948/ie2019.06.05.
Full textDini, Gianluca, and Angelica Lo Duca. "On securing publish-subscribe systems with security groups." In 2009 IEEE Symposium on Computers and Communications (ISCC). IEEE, 2009. http://dx.doi.org/10.1109/iscc.2009.5202278.
Full textGhonaimy, M. Adeeb. "Quantum network security." In Systems (ICCES). IEEE, 2009. http://dx.doi.org/10.1109/icces.2009.5383322.
Full textLifeng Lai, Siu-Wai Ho, and H. Vincent Poor. "Privacy-security tradeoffs in biometric security systems." In 2008 46th Annual Allerton Conference on Communication, Control, and Computing. IEEE, 2008. http://dx.doi.org/10.1109/allerton.2008.4797566.
Full textReports on the topic "Security systems"
Bayuk, Jennifer, Dennis Barnabe, Jonathan Goodnight, Drew Hamilton, Barry Horowitz, Clifford Neuman, and Stas' Tarchalski. Systems Security Engineering. Fort Belvoir, VA: Defense Technical Information Center, August 2010. http://dx.doi.org/10.21236/ada637296.
Full textEverett, H. R. Robotic Security Systems. Fort Belvoir, VA: Defense Technical Information Center, December 2003. http://dx.doi.org/10.21236/ada422075.
Full textBarkley, John. Security in open systems. Gaithersburg, MD: National Institute of Standards and Technology, 1994. http://dx.doi.org/10.6028/nist.sp.800-7.
Full textFaculjak, D. A. Implementing security measures for computer-based security systems. Office of Scientific and Technical Information (OSTI), February 1989. http://dx.doi.org/10.2172/6137987.
Full textGanger, Gregory R. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security (Self-Securing Devices). Fort Belvoir, VA: Defense Technical Information Center, January 2007. http://dx.doi.org/10.21236/ada465393.
Full textAckermann, Mark R. Trusting National Security Systems: Issues for National Security Leadership. Office of Scientific and Technical Information (OSTI), August 2014. http://dx.doi.org/10.2172/1150236.
Full textGage, Douglas W., W. D. Bryan, and Hoa G. Nguyen. Internetting Tactical Security Sensor Systems. Fort Belvoir, VA: Defense Technical Information Center, April 1998. http://dx.doi.org/10.21236/ada422499.
Full textNazario, Noel. Security labels for open systems:. Gaithersburg, MD: National Institute of Standards and Technology, 1990. http://dx.doi.org/10.6028/nist.ir.4362.
Full textSteinauer, Dennis D. Security of personal computer systems. Gaithersburg, MD: National Bureau of Standards, 1985. http://dx.doi.org/10.6028/nbs.sp.500-120.
Full textKloske, John, and Scot T. Tripp. Advanced Underwater Port Security Systems. Fort Belvoir, VA: Defense Technical Information Center, September 2002. http://dx.doi.org/10.21236/ada626957.
Full text