Journal articles on the topic 'Security systems'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security systems.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Dudykevyc, Valeriy, Galyna Mykytyn, Taras Kret, and Andrii Rebets. "Security of Cyber-Physical Systems from Concept to Complex Information Security System." Advances in Cyber-Physical Systems 1, no. 2 (February 23, 2016): 67–75. http://dx.doi.org/10.23939/acps2016.02.067.
Full textMacleod, Ian. "Security Systems." Expository Times 100, no. 10 (July 1989): 382–83. http://dx.doi.org/10.1177/001452468910001010.
Full textSharkov, George. "A System-of-Systems Approach to Cyber Security and Resilience." Information & Security: An International Journal 37 (2017): 69–94. http://dx.doi.org/10.11610/isij.3706.
Full textJahankhani, Hamid, Shantha Fernando, Mathews Z. Nkhoma, and Haralambos Mouratidis. "Information Systems Security." International Journal of Information Security and Privacy 1, no. 3 (July 2007): 13–25. http://dx.doi.org/10.4018/jisp.2007070102.
Full textEverett, H. R. "Robotics security systems." IEEE Instrumentation & Measurement Magazine 6, no. 4 (December 2003): 30–34. http://dx.doi.org/10.1109/mim.2003.1251480.
Full textStapley, Gerry. "Intelligent security systems." Property Management 4, no. 4 (April 1986): 328–31. http://dx.doi.org/10.1108/eb006636.
Full textEckert, Claudia. "Embedded systems security." Datenschutz und Datensicherheit - DuD 36, no. 12 (November 24, 2012): 861. http://dx.doi.org/10.1007/s11623-012-0289-x.
Full textkumar, Amit, and Sunita Sangwan. "Biometric Security Systems." International Journal of Engineering Trends and Technology 11, no. 4 (May 25, 2014): 169–70. http://dx.doi.org/10.14445/22315381/ijett-v11p233.
Full textBayuk, Jennifer L. "Systems Security Engineering." IEEE Security & Privacy Magazine 9, no. 2 (March 2011): 72–74. http://dx.doi.org/10.1109/msp.2011.41.
Full textSherman, Robin L. "Distributed systems security." Computers & Security 11, no. 1 (March 1992): 24–28. http://dx.doi.org/10.1016/0167-4048(92)90216-e.
Full textLawson-Smith, Peter. "Building security systems." Wiring Installations and Supplies 1985, no. 22 (1985): 17. http://dx.doi.org/10.1049/wis.1985.0004.
Full textBayuk, Jennifer, and Ali Mostashari. "Measuring systems security." Systems Engineering 16, no. 1 (November 12, 2012): 1–14. http://dx.doi.org/10.1002/sys.21211.
Full textOh, Sang-Yeob, Supratip Ghose, Yu-Keum Jeong, Joong-Kyung Ryu, and Jungsoo Han. "Convergence security systems." Journal of Computer Virology and Hacking Techniques 11, no. 3 (July 21, 2015): 119–21. http://dx.doi.org/10.1007/s11416-015-0248-9.
Full textDove, Rick, Mark Winstead, Holy Dunlap, Matthew Hause, Aleksandra Scalco, Keith Willett, Adam D. Williams, and Beth Wilson. "Democratizing Systems Security." INCOSE International Symposium 33, no. 1 (July 2023): 86–97. http://dx.doi.org/10.1002/iis2.13010.
Full textGanzhur, M. A., and A. I. Bryukhovetsky. "Network security systems." Herald of Dagestan State Technical University. Technical Sciences 49, no. 3 (November 8, 2022): 61–67. http://dx.doi.org/10.21822/2073-6185-2022-49-3-61-67.
Full textENNERT, Michal, Branislav MADOŠ, and Zuzana DUDLÁKOVÁ. "DATA VISUALIZATION OF NETWORK SECURITY SYSTEMS." Acta Electrotechnica et Informatica 14, no. 4 (December 1, 2014): 13–16. http://dx.doi.org/10.15546/aeei-2014-0034.
Full textPetkova, Lilyana, and Vasilisa Pavlova. "Security Analysis on Content Management Systems." Mathematics and Informatics LXV, no. 5 (October 28, 2022): 423–34. http://dx.doi.org/10.53656/math2022-5-2-sec.
Full textPetersen, DR, and J.-F. Bouisser. "Security Technologies and Techniques: Airport Security Systems." Journal of Testing and Evaluation 22, no. 3 (1994): 247. http://dx.doi.org/10.1520/jte11823j.
Full textGonzalez-Parra, Gilberto, and Abraham J. Arenas. "A Mathematical Model for Social Security Systems with Dynamical Systems." Ingeniería y Ciencia 10, no. 19 (January 2014): 33–53. http://dx.doi.org/10.17230/ingciencia.10.19.2.
Full textBai, Yan, Lirong Dai, and Juan Li. "Issues and Challenges in Securing eHealth Systems." International Journal of E-Health and Medical Communications 5, no. 1 (January 2014): 1–19. http://dx.doi.org/10.4018/ijehmc.2014010101.
Full textThopate, Kaushalya, Sandip Shinde, Rupali Mahajan, Rajkumar Bhagat, Piyush Joshi, Akshata Kalbhor, Amey Kulkarni, and Swayam Jadhav. "Keyless Security." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 8s (August 18, 2023): 170–74. http://dx.doi.org/10.17762/ijritcc.v11i8s.7187.
Full textBrumă, Ovidiu-Vasile. "Vulnerabilities of Information Systems." International Journal of Information Security and Cybercrime 9, no. 1 (June 22, 2020): 9–14. http://dx.doi.org/10.19107/ijisc.2020.01.01.
Full textGarasym, Y. R. "Survivable security systems analysis." Military Technical Collection, no. 4 (May 4, 2011): 87–95. http://dx.doi.org/10.33577/2312-4458.4.2011.87-95.
Full textBjelajac, Željko, and Slavimir Vesić. "Security of information systems." Pravo - teorija i praksa 37, no. 2 (2020): 63–76. http://dx.doi.org/10.5937/ptp2002063b.
Full textTruchan, Jarosław Radosław. "Selected Security Information Systems." Internal Security 12, no. 2 (December 30, 2020): 38–39. http://dx.doi.org/10.5604/01.3001.0014.6695.
Full textAndrzejewski, Kamil. "Security information management systems." Management Sciences 24, no. 4 (2020): 1–9. http://dx.doi.org/10.15611/ms.2019.4.01.
Full textKný, Milan. "Security Management - Systems Approach." Acta Informatica Pragensia 4, no. 3 (December 31, 2015): 326–35. http://dx.doi.org/10.18267/j.aip.79.
Full textNaemura, Kenji, Kineo Matsui, and Koichi Sakurai. "Security of Multimedia Systems." Journal of the Institute of Image Information and Television Engineers 56, no. 7 (2002): 1048–56. http://dx.doi.org/10.3169/itej.56.1048.
Full textZorzi, M. "Security in wireless systems." IEEE Wireless Communications 11, no. 1 (February 2004): 2. http://dx.doi.org/10.1109/mwc.2004.1269708.
Full textDavis, James F. "Information systems security engineering." ACM SIGAda Ada Letters XXIV, no. 4 (December 2004): 13–18. http://dx.doi.org/10.1145/1046191.1032300.
Full textUezono, Tadahiro. "Security in Information Systems." Journal of the Society of Mechanical Engineers 95, no. 879 (1992): 147–51. http://dx.doi.org/10.1299/jsmemag.95.879_147.
Full textAtluri, Vijay. "Security for Workflow Systems." Information Security Technical Report 6, no. 2 (June 2001): 59–68. http://dx.doi.org/10.1016/s1363-4127(01)00207-2.
Full textAdámek, Milan, Miroslav Matýsek, and Petr Neumann. "Security of Biometric Systems." Procedia Engineering 100 (2015): 169–76. http://dx.doi.org/10.1016/j.proeng.2015.01.355.
Full textTrueman, Peter. "Security for distributed systems." Data Processing 28, no. 4 (May 1986): 187–90. http://dx.doi.org/10.1016/0011-684x(86)90359-x.
Full textDosdale, Terry. "Security in EDIFACT systems." Computer Communications 17, no. 7 (July 1994): 532–37. http://dx.doi.org/10.1016/0140-3664(94)90107-4.
Full textJackson, Keith. "Systems security review - EPS." Computer Fraud & Security Bulletin 9, no. 12 (October 1987): 1–4. http://dx.doi.org/10.1016/0142-0496(87)90079-8.
Full textJackson, Keith. "Security in office systems." Computer Fraud & Security Bulletin 9, no. 12 (October 1987): 12–14. http://dx.doi.org/10.1016/0142-0496(87)90086-5.
Full textJackson, Keith. "Designing Information Systems Security." Computer Fraud & Security Bulletin 11, no. 3 (January 1989): 15–16. http://dx.doi.org/10.1016/0142-0496(89)90195-1.
Full textMuftic, Sead. "Security in IBM systems." Computer Audit Update 1992, no. 1 (January 1992): 21. http://dx.doi.org/10.1016/0960-2593(92)90030-q.
Full textRavi, Srivaths, Anand Raghunathan, Paul Kocher, and Sunil Hattangady. "Security in embedded systems." ACM Transactions on Embedded Computing Systems 3, no. 3 (August 2004): 461–91. http://dx.doi.org/10.1145/1015047.1015049.
Full textKruys, Jan P. "Security of open systems." Computers & Security 8, no. 2 (April 1989): 139–47. http://dx.doi.org/10.1016/0167-4048(89)90069-2.
Full textWeber, Arnd, L. Kool, G. Munnichs, and Anders Jacobi. "Security of eGovernment Systems." TATuP - Zeitschrift für Technikfolgenabschätzung in Theorie und Praxis 22, no. 3 (November 1, 2013): 49–51. http://dx.doi.org/10.14512/tatup.22.3.49.
Full textWilson, D. L. "Airport information systems security." IEEE Aerospace and Electronic Systems Magazine 18, no. 4 (April 2003): 25–27. http://dx.doi.org/10.1109/maes.2003.1194086.
Full textWestenkirchner, Suzy. "Integrated Library Security Systems." Library & Archival Security 21, no. 2 (September 11, 2008): 159–67. http://dx.doi.org/10.1080/01960070802201789.
Full textZseby, Tanja. "Cyber-Physical Systems – Security." e & i Elektrotechnik und Informationstechnik 135, no. 3 (June 2018): 249. http://dx.doi.org/10.1007/s00502-018-0619-2.
Full textObaidat, Mohammad S., Petros Nicopolitidis, and Weili Han. "Security of e-systems." Security and Communication Networks 7, no. 2 (November 28, 2013): 322–24. http://dx.doi.org/10.1002/sec.897.
Full textChangchit, Chuleeporn. "Security Systems Framework, Security-Related Research, Web Threats." Journal of Information Privacy and Security 7, no. 4 (October 2011): 1–2. http://dx.doi.org/10.1080/15536548.2011.10855920.
Full textWestphall, Carlos Becker, and Peter Mueller. "Management of Security and Security for Management Systems." Journal of Network and Systems Management 18, no. 3 (June 12, 2010): 241–43. http://dx.doi.org/10.1007/s10922-010-9172-y.
Full textYang, Xia. "A Novel Information Security Model for Securing Information Systems." Applied Mechanics and Materials 685 (October 2014): 493–96. http://dx.doi.org/10.4028/www.scientific.net/amm.685.493.
Full textZhang, Zhiming, and Qiaoyan Yu. "Towards Energy-Efficient and Secure Computing Systems." Journal of Low Power Electronics and Applications 8, no. 4 (November 27, 2018): 48. http://dx.doi.org/10.3390/jlpea8040048.
Full text