To see the other types of publications on this topic, follow the link: Security systems.

Journal articles on the topic 'Security systems'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Security systems.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Dudykevyc, Valeriy, Galyna Mykytyn, Taras Kret, and Andrii Rebets. "Security of Cyber-Physical Systems from Concept to Complex Information Security System." Advances in Cyber-Physical Systems 1, no. 2 (February 23, 2016): 67–75. http://dx.doi.org/10.23939/acps2016.02.067.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Macleod, Ian. "Security Systems." Expository Times 100, no. 10 (July 1989): 382–83. http://dx.doi.org/10.1177/001452468910001010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sharkov, George. "A System-of-Systems Approach to Cyber Security and Resilience." Information & Security: An International Journal 37 (2017): 69–94. http://dx.doi.org/10.11610/isij.3706.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jahankhani, Hamid, Shantha Fernando, Mathews Z. Nkhoma, and Haralambos Mouratidis. "Information Systems Security." International Journal of Information Security and Privacy 1, no. 3 (July 2007): 13–25. http://dx.doi.org/10.4018/jisp.2007070102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Everett, H. R. "Robotics security systems." IEEE Instrumentation & Measurement Magazine 6, no. 4 (December 2003): 30–34. http://dx.doi.org/10.1109/mim.2003.1251480.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Stapley, Gerry. "Intelligent security systems." Property Management 4, no. 4 (April 1986): 328–31. http://dx.doi.org/10.1108/eb006636.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Eckert, Claudia. "Embedded systems security." Datenschutz und Datensicherheit - DuD 36, no. 12 (November 24, 2012): 861. http://dx.doi.org/10.1007/s11623-012-0289-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

kumar, Amit, and Sunita Sangwan. "Biometric Security Systems." International Journal of Engineering Trends and Technology 11, no. 4 (May 25, 2014): 169–70. http://dx.doi.org/10.14445/22315381/ijett-v11p233.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bayuk, Jennifer L. "Systems Security Engineering." IEEE Security & Privacy Magazine 9, no. 2 (March 2011): 72–74. http://dx.doi.org/10.1109/msp.2011.41.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sherman, Robin L. "Distributed systems security." Computers & Security 11, no. 1 (March 1992): 24–28. http://dx.doi.org/10.1016/0167-4048(92)90216-e.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Lawson-Smith, Peter. "Building security systems." Wiring Installations and Supplies 1985, no. 22 (1985): 17. http://dx.doi.org/10.1049/wis.1985.0004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Bayuk, Jennifer, and Ali Mostashari. "Measuring systems security." Systems Engineering 16, no. 1 (November 12, 2012): 1–14. http://dx.doi.org/10.1002/sys.21211.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Oh, Sang-Yeob, Supratip Ghose, Yu-Keum Jeong, Joong-Kyung Ryu, and Jungsoo Han. "Convergence security systems." Journal of Computer Virology and Hacking Techniques 11, no. 3 (July 21, 2015): 119–21. http://dx.doi.org/10.1007/s11416-015-0248-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Dove, Rick, Mark Winstead, Holy Dunlap, Matthew Hause, Aleksandra Scalco, Keith Willett, Adam D. Williams, and Beth Wilson. "Democratizing Systems Security." INCOSE International Symposium 33, no. 1 (July 2023): 86–97. http://dx.doi.org/10.1002/iis2.13010.

Full text
Abstract:
AbstractAs systems security joins the top concerns of systems engineering, the availability and affordability of already scarce security expertise presents a resource barrier and raises questions about the nature of competency needed in the systems engineering team. Workshops in 2022 exploring the eleven strategies outlined in the 2021 roadmap for Security in the Future of Systems Engineering revealed one strategy as centrally synergistic with all the other ten: Stakeholder Alignment. Investigating means and effects of aligning stakeholders on security requirements led to the understanding that security expressed as loss‐driven needs and capabilities would be accessible to everyone, independent of how those needs and capabilities would be realized. This article makes a case for achieving stakeholder security alignment as a means to efffectualize security as a foundational perspective in system design and actualize security proficiency in the SE team.
APA, Harvard, Vancouver, ISO, and other styles
15

Ganzhur, M. A., and A. I. Bryukhovetsky. "Network security systems." Herald of Dagestan State Technical University. Technical Sciences 49, no. 3 (November 8, 2022): 61–67. http://dx.doi.org/10.21822/2073-6185-2022-49-3-61-67.

Full text
Abstract:
Objective. Network security systems are one of the key players in today's business life. Some networks are private while others are open to the public. Whether your network is private or public, it must be well secured and secure. In this article, we will discuss where network security begins, and describe the general measures taken to secure it.Method. The study is determined by the need to solve the problem of algorithmic and mathematical support for assessing the functional security of a network based on system modeling and finding erroneous positions.Result. Proposed deployment of a private network system that is designed and serves a specific group of people for communication, collaboration and sharing.Conclusion. The proposed methods can be effective in protecting the network from attacks and other security threats. Well-designed corporate policies are critical to defining and controlling access to various parts of the network.
APA, Harvard, Vancouver, ISO, and other styles
16

ENNERT, Michal, Branislav MADOŠ, and Zuzana DUDLÁKOVÁ. "DATA VISUALIZATION OF NETWORK SECURITY SYSTEMS." Acta Electrotechnica et Informatica 14, no. 4 (December 1, 2014): 13–16. http://dx.doi.org/10.15546/aeei-2014-0034.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Petkova, Lilyana, and Vasilisa Pavlova. "Security Analysis on Content Management Systems." Mathematics and Informatics LXV, no. 5 (October 28, 2022): 423–34. http://dx.doi.org/10.53656/math2022-5-2-sec.

Full text
Abstract:
This paper is dedicated to the challenges of the use of the most popular content management systems (CMS) in software development. Fundamental information about the selected CMS platforms and vulnerability analysis are introduced. The review is made on CMS like Umbraco, Sitecore, WordPress and Drupal categorized in two groups defined by the technology used for development. And as the IT world changes a lot these brings one constant battle against threats. Therefore, this article will add some vulnerabilities analysis of the selected systems since 2014. Results were grouped by common vulnerabilities of the selected platforms and such specific ones.
APA, Harvard, Vancouver, ISO, and other styles
18

Petersen, DR, and J.-F. Bouisser. "Security Technologies and Techniques: Airport Security Systems." Journal of Testing and Evaluation 22, no. 3 (1994): 247. http://dx.doi.org/10.1520/jte11823j.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Gonzalez-Parra, Gilberto, and Abraham J. Arenas. "A Mathematical Model for Social Security Systems with Dynamical Systems." Ingeniería y Ciencia 10, no. 19 (January 2014): 33–53. http://dx.doi.org/10.17230/ingciencia.10.19.2.

Full text
Abstract:
In this paper it is proposed a mathematical approach based ondynamicsystems to study the effect of the increase in the Social Security normalretirement age on the worker and on the dynamics of retiree populations.In order to simplify this initial effort, the proposed model does not includesome economic variables, such as wage growth, earnings or productivity.Here, we employ numerical simulations of the model to investigate the dy-namics of the labor force under different demographic scenarios. Analysisof this type of model with numerical simulations can help government economic planners make optimal strategies to sustain pension systems andforecast future trends of pensioner and worker populations.
APA, Harvard, Vancouver, ISO, and other styles
20

Bai, Yan, Lirong Dai, and Juan Li. "Issues and Challenges in Securing eHealth Systems." International Journal of E-Health and Medical Communications 5, no. 1 (January 2014): 1–19. http://dx.doi.org/10.4018/ijehmc.2014010101.

Full text
Abstract:
With the widespread eHealth usage, security of eHealth services is becoming increasingly important. In this paper, we analyze the security problems in eHealth systems, discuss various approaches of securing health data collection and sharing proposed in the recent literature on eHealth security, and provide comparative evaluations that include advantages and limitations of each approach. Possible future research directions on each approach for enhancing security for eHealth applications are also suggested.
APA, Harvard, Vancouver, ISO, and other styles
21

Thopate, Kaushalya, Sandip Shinde, Rupali Mahajan, Rajkumar Bhagat, Piyush Joshi, Akshata Kalbhor, Amey Kulkarni, and Swayam Jadhav. "Keyless Security." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 8s (August 18, 2023): 170–74. http://dx.doi.org/10.17762/ijritcc.v11i8s.7187.

Full text
Abstract:
This research paper introduces a novel approach to improve security and access control in smart door lock systems. The proposed system incorporates multi-factor authentication, combining a numerical keypad, mobile app, and RFID sensor. Each authentication method is associated with a specific lock, offering differentiated access control. Notably, the system requires the simultaneous use of the mobile app and RFID sensor to unlock a designated lock, adding an extra layer of security. To assess the system's effectiveness, a comprehensive study was conducted, considering security, usability, and user satisfaction. The study involved simulated attacks, user surveys, and usability tests, with data analysis providing insights into the system's resilience and user acceptance. This research contributes to the field of smart door lock systems by offering an innovative approach to enhance security through multi-factor authentication. The findings provide valuable insights for designing advanced access control mechanisms, empowering users with increased confidence in their security measures while maintaining a user-friendly experience.
APA, Harvard, Vancouver, ISO, and other styles
22

Brumă, Ovidiu-Vasile. "Vulnerabilities of Information Systems." International Journal of Information Security and Cybercrime 9, no. 1 (June 22, 2020): 9–14. http://dx.doi.org/10.19107/ijisc.2020.01.01.

Full text
Abstract:
Vulnerability of Information Systems is a major concern these days in all spheres of financial, government and even private sectors. There have been limited attempts in addressing the people who use the computers though they are the greatest loophole in information systems security. Even though most of the organizations have realized the value of information and the part it plays in the success of the business, yet only a few take adequate measures in ensuring the security of their information, preventing unauthorized access, securing data from intrusion and unapproved disclosures etc. This paper examines and addresses the threats end-users pose to systems security and provides solutions for two of the most dangerous vulnerabilities: Buffer Overflow, SQL Injection.
APA, Harvard, Vancouver, ISO, and other styles
23

Garasym, Y. R. "Survivable security systems analysis." Military Technical Collection, no. 4 (May 4, 2011): 87–95. http://dx.doi.org/10.33577/2312-4458.4.2011.87-95.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Bjelajac, Željko, and Slavimir Vesić. "Security of information systems." Pravo - teorija i praksa 37, no. 2 (2020): 63–76. http://dx.doi.org/10.5937/ptp2002063b.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Truchan, Jarosław Radosław. "Selected Security Information Systems." Internal Security 12, no. 2 (December 30, 2020): 38–39. http://dx.doi.org/10.5604/01.3001.0014.6695.

Full text
Abstract:
At present, one of the main areas ensuring the proper functioning of services responsible for security is ICT systems, which are used to obtain, store and process relevant information and to support the performance of statutory tasks. When carrying out their statutory tasks, the Polish police use centralised, advanced IT systems and databases, e.g. the National Police Information System (hereinafter referred to as the KSIP). At the same time, the development of technology generates the need to constantly modify this line of activity. The necessity of being adaptable to the ever-changing environment has encouraged the Police Academy in Szczytno and its partners to launch the project entitled: Information and analysis system to support risk management when planning and carrying out police operations (hereinafter referred to as the SIA). Innovative in nature, the project is being implemented based on, among others, expert interviews conducted among police commanding officers. The SIA is being built using the data collected and stored in the police ICT systems and obtained from other sources. The works will result in the development of a possibly full application with planning and decision-making mechanisms and forecasting algorithms, which will provide information on probable successes and necessary investments in possible scenarios of police activities to be undertaken in a specific situation of massive disturbance to public order and safety. The proposed solution is the IT system that serves both as a presentation and simulation of possible incidents in the virtual environment. The author presents the functioning of selected modern ICT systems, and their role and importance in supporting decision-making processes when ensuring public order and safety.
APA, Harvard, Vancouver, ISO, and other styles
26

Andrzejewski, Kamil. "Security information management systems." Management Sciences 24, no. 4 (2020): 1–9. http://dx.doi.org/10.15611/ms.2019.4.01.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Kný, Milan. "Security Management - Systems Approach." Acta Informatica Pragensia 4, no. 3 (December 31, 2015): 326–35. http://dx.doi.org/10.18267/j.aip.79.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Naemura, Kenji, Kineo Matsui, and Koichi Sakurai. "Security of Multimedia Systems." Journal of the Institute of Image Information and Television Engineers 56, no. 7 (2002): 1048–56. http://dx.doi.org/10.3169/itej.56.1048.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Zorzi, M. "Security in wireless systems." IEEE Wireless Communications 11, no. 1 (February 2004): 2. http://dx.doi.org/10.1109/mwc.2004.1269708.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Davis, James F. "Information systems security engineering." ACM SIGAda Ada Letters XXIV, no. 4 (December 2004): 13–18. http://dx.doi.org/10.1145/1046191.1032300.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Uezono, Tadahiro. "Security in Information Systems." Journal of the Society of Mechanical Engineers 95, no. 879 (1992): 147–51. http://dx.doi.org/10.1299/jsmemag.95.879_147.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Atluri, Vijay. "Security for Workflow Systems." Information Security Technical Report 6, no. 2 (June 2001): 59–68. http://dx.doi.org/10.1016/s1363-4127(01)00207-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Adámek, Milan, Miroslav Matýsek, and Petr Neumann. "Security of Biometric Systems." Procedia Engineering 100 (2015): 169–76. http://dx.doi.org/10.1016/j.proeng.2015.01.355.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Trueman, Peter. "Security for distributed systems." Data Processing 28, no. 4 (May 1986): 187–90. http://dx.doi.org/10.1016/0011-684x(86)90359-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Dosdale, Terry. "Security in EDIFACT systems." Computer Communications 17, no. 7 (July 1994): 532–37. http://dx.doi.org/10.1016/0140-3664(94)90107-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Jackson, Keith. "Systems security review - EPS." Computer Fraud & Security Bulletin 9, no. 12 (October 1987): 1–4. http://dx.doi.org/10.1016/0142-0496(87)90079-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Jackson, Keith. "Security in office systems." Computer Fraud & Security Bulletin 9, no. 12 (October 1987): 12–14. http://dx.doi.org/10.1016/0142-0496(87)90086-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Jackson, Keith. "Designing Information Systems Security." Computer Fraud & Security Bulletin 11, no. 3 (January 1989): 15–16. http://dx.doi.org/10.1016/0142-0496(89)90195-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Muftic, Sead. "Security in IBM systems." Computer Audit Update 1992, no. 1 (January 1992): 21. http://dx.doi.org/10.1016/0960-2593(92)90030-q.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Ravi, Srivaths, Anand Raghunathan, Paul Kocher, and Sunil Hattangady. "Security in embedded systems." ACM Transactions on Embedded Computing Systems 3, no. 3 (August 2004): 461–91. http://dx.doi.org/10.1145/1015047.1015049.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Kruys, Jan P. "Security of open systems." Computers & Security 8, no. 2 (April 1989): 139–47. http://dx.doi.org/10.1016/0167-4048(89)90069-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Weber, Arnd, L. Kool, G. Munnichs, and Anders Jacobi. "Security of eGovernment Systems." TATuP - Zeitschrift für Technikfolgenabschätzung in Theorie und Praxis 22, no. 3 (November 1, 2013): 49–51. http://dx.doi.org/10.14512/tatup.22.3.49.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Wilson, D. L. "Airport information systems security." IEEE Aerospace and Electronic Systems Magazine 18, no. 4 (April 2003): 25–27. http://dx.doi.org/10.1109/maes.2003.1194086.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Westenkirchner, Suzy. "Integrated Library Security Systems." Library & Archival Security 21, no. 2 (September 11, 2008): 159–67. http://dx.doi.org/10.1080/01960070802201789.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Zseby, Tanja. "Cyber-Physical Systems – Security." e & i Elektrotechnik und Informationstechnik 135, no. 3 (June 2018): 249. http://dx.doi.org/10.1007/s00502-018-0619-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Obaidat, Mohammad S., Petros Nicopolitidis, and Weili Han. "Security of e-systems." Security and Communication Networks 7, no. 2 (November 28, 2013): 322–24. http://dx.doi.org/10.1002/sec.897.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Changchit, Chuleeporn. "Security Systems Framework, Security-Related Research, Web Threats." Journal of Information Privacy and Security 7, no. 4 (October 2011): 1–2. http://dx.doi.org/10.1080/15536548.2011.10855920.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Westphall, Carlos Becker, and Peter Mueller. "Management of Security and Security for Management Systems." Journal of Network and Systems Management 18, no. 3 (June 12, 2010): 241–43. http://dx.doi.org/10.1007/s10922-010-9172-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Yang, Xia. "A Novel Information Security Model for Securing Information Systems." Applied Mechanics and Materials 685 (October 2014): 493–96. http://dx.doi.org/10.4028/www.scientific.net/amm.685.493.

Full text
Abstract:
Securing information system in current information era is very important task. This paper presents a novel security model in order to secure sensitive information systems. This model combines protection, detection, recovery and control mechanisms to secure information system in their development lifecycle, which is more effective than the traditional ones.
APA, Harvard, Vancouver, ISO, and other styles
50

Zhang, Zhiming, and Qiaoyan Yu. "Towards Energy-Efficient and Secure Computing Systems." Journal of Low Power Electronics and Applications 8, no. 4 (November 27, 2018): 48. http://dx.doi.org/10.3390/jlpea8040048.

Full text
Abstract:
Countermeasures against diverse security threats typically incur noticeable hardware cost and power overhead, which may become the obstacle for those countermeasures to be applicable in energy-efficient computing systems. This work presents a summary of energy-efficiency techniques that have been applied in security primitives or mechanisms to ensure computing systems’ resilience against various security threats on hardware. This work also uses examples to discuss practical methods for securing the hardware for computing systems to achieve energy efficiency.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography