Journal articles on the topic 'Security control framework'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security control framework.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Wang, Yu Fei, Tao Zhang, Yuan Yuan Ma, and Bo Zhang. "An Information Security Assessments Framework for Power Control Systems." Advanced Materials Research 805-806 (September 2013): 980–84. http://dx.doi.org/10.4028/www.scientific.net/amr.805-806.980.
Full textAl Ketbi, Maitha, Khaled Shuaib, Ezedin Barka, and Marton Gergely. "Establishing a Security Control Framework for Blockchain Technology." Interdisciplinary Journal of Information, Knowledge, and Management 16 (2021): 307–30. http://dx.doi.org/10.28945/4837.
Full textLu, Bo, Ruohan Cao, Luyao Tian, Hao Wang, and Yueming Lu. "FMNISCF: Fine-Grained Multi-Domain Network Interconnection Security Control Framework." Applied Sciences 10, no. 1 (January 6, 2020): 409. http://dx.doi.org/10.3390/app10010409.
Full textJamieson, Rodger, and Graham Low. "Local Area Network Operations: A Security, Control and Audit Perspective." Journal of Information Technology 5, no. 2 (June 1990): 63–72. http://dx.doi.org/10.1177/026839629000500202.
Full textCHEN, TSUNG-YI. "A MULTIPLE-LAYER KNOWLEDGE MANAGEMENT SYSTEM FRAMEWORK CONSIDERING USER KNOWLEDGE PRIVILEGES." International Journal of Software Engineering and Knowledge Engineering 19, no. 03 (May 2009): 361–87. http://dx.doi.org/10.1142/s0218194009004192.
Full textBinghui, ZHENG, WANG Lijing, LI Hong, and LI Xiaobao. "Technical framework for ecological security control in lakes and reservoirs." Journal of Lake Sciences 26, no. 2 (2014): 169–76. http://dx.doi.org/10.18307/2014.0201.
Full textEL Yamany, Hany F., Miriam A. M. Capretz, and David S. Allison. "Intelligent security and access control framework for service-oriented architecture." Information and Software Technology 52, no. 2 (February 2010): 220–36. http://dx.doi.org/10.1016/j.infsof.2009.10.005.
Full textNaoui, Sarra, Mohamed Elhoucine Elhdhili, and Leila Azouz Saidane. "Novel Enhanced LoRaWAN Framework for Smart Home Remote Control Security." Wireless Personal Communications 110, no. 4 (November 16, 2019): 2109–30. http://dx.doi.org/10.1007/s11277-019-06832-x.
Full textPavlich-Mariscal, Jaime A., Steven A. Demurjian, and Laurent D. Michel. "A framework for security assurance of access control enforcement code." Computers & Security 29, no. 7 (October 2010): 770–84. http://dx.doi.org/10.1016/j.cose.2010.03.004.
Full textHu, An Ming. "The Application Research of Lightweight J2EE Security Framework." Advanced Materials Research 989-994 (July 2014): 4342–45. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4342.
Full textLima, António, Luis Rosa, Tiago Cruz, and Paulo Simões. "A Security Monitoring Framework for Mobile Devices." Electronics 9, no. 8 (July 25, 2020): 1197. http://dx.doi.org/10.3390/electronics9081197.
Full textNicho, Mathew, Hussein Fakhry, and Charles Haiber. "An Integrated Security Governance Framework for Effective PCI DSS Implementation." International Journal of Information Security and Privacy 5, no. 3 (July 2011): 50–67. http://dx.doi.org/10.4018/jisp.2011070104.
Full textH. Ali, Mohammed, and Nisreen K. Ali. "IoT based security system and intelligent home automation multi monitoring and control systems." IAES International Journal of Robotics and Automation (IJRA) 8, no. 3 (September 1, 2019): 205. http://dx.doi.org/10.11591/ijra.v8i3.pp205-210.
Full textPatel, Subhash Chandra, Sumit Jaiswal, Ravi Shankar Singh, and Jyoti Chauhan. "Access Control Framework Using Multi-Factor Authentication in Cloud Computing." International Journal of Green Computing 9, no. 2 (July 2018): 1–15. http://dx.doi.org/10.4018/ijgc.2018070101.
Full textWang, Chun Lei, Qing Miao, Lan Fang, and Yi Qi Dai. "A Novel Framework for Industrial Control System Malicious Code Analysis." Advanced Materials Research 765-767 (September 2013): 1936–42. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1936.
Full textTung, Shu Chu, Wu Jeng Li, and Shih Miao Huang. "Home Security Service and Condition Control." Applied Mechanics and Materials 479-480 (December 2013): 661–64. http://dx.doi.org/10.4028/www.scientific.net/amm.479-480.661.
Full textYu, Zhi Wei. "A Business Process-Based Risk Evaluation Framework." Advanced Materials Research 230-232 (May 2011): 1024–28. http://dx.doi.org/10.4028/www.scientific.net/amr.230-232.1024.
Full textAruljothi, A., N. Prabhu, and N. M. Mallika. "Network Security Based on Component for Information Network." Asian Journal of Computer Science and Technology 8, S1 (February 5, 2019): 15–17. http://dx.doi.org/10.51983/ajcst-2019.8.s1.1986.
Full textPretorius, Barend, and Brett van Niekerk. "Cyber-Security for ICS/SCADA." International Journal of Cyber Warfare and Terrorism 6, no. 3 (July 2016): 1–16. http://dx.doi.org/10.4018/ijcwt.2016070101.
Full textKriaa, Siwar, Marc Bouissou, and Youssef Laarouchi. "A new safety and security risk analysis framework for industrial control systems." Proceedings of the Institution of Mechanical Engineers, Part O: Journal of Risk and Reliability 233, no. 2 (April 19, 2018): 151–74. http://dx.doi.org/10.1177/1748006x18765885.
Full textMarrapu, Satvika, Satyanarayana Sanakkayala, Arun kumar Vempalli, and Sai Krishna Jayavarapu. "Smart home based security system for door access control using smart phone." International Journal of Engineering & Technology 7, no. 1.8 (March 3, 2018): 249. http://dx.doi.org/10.14419/ijet.v7i1.9247.
Full textKhalid, Tauqeer, Abdul Nasir Khan, Mazhar Ali, Adil Adeel, Atta ur Rehman Khan, and Junaid Shuja. "A fog-based security framework for intelligent traffic light control system." Multimedia Tools and Applications 78, no. 17 (December 14, 2018): 24595–615. http://dx.doi.org/10.1007/s11042-018-7008-z.
Full textAni, Uchenna P. Daniel, Hongmei (Mary) He, and Ashutosh Tiwari. "A framework for Operational Security Metrics Development for industrial control environment." Journal of Cyber Security Technology 2, no. 3-4 (October 2, 2018): 201–37. http://dx.doi.org/10.1080/23742917.2018.1554986.
Full textZhang, Hongbin, Junshe Wang, Jiang Chang, and Ning Cao. "An access control framework for multi-level security in cloud environments." International Journal of Innovative Computing and Applications 9, no. 3 (2018): 134. http://dx.doi.org/10.1504/ijica.2018.093731.
Full textChang, Jiang, Hongbin Zhang, Ning Cao, and Junshe Wang. "An access control framework for multi-level security in cloud environments." International Journal of Innovative Computing and Applications 9, no. 3 (2018): 134. http://dx.doi.org/10.1504/ijica.2018.10014853.
Full textSafdar, G. A., M. O', and N. A. Neill. "A novel common control channel security framework for cognitive radio networks." International Journal of Autonomous and Adaptive Communications Systems 5, no. 2 (2012): 125. http://dx.doi.org/10.1504/ijaacs.2012.046281.
Full textKim, Hyoungju, and Junho Choi. "Intelligent Access Control Design for Security Context Awareness in Smart Grid." Sustainability 13, no. 8 (April 7, 2021): 4124. http://dx.doi.org/10.3390/su13084124.
Full textWang, Yufei, Tengbiao Zhang, and Qian Ye. "Situation awareness framework for industrial control system based on cyber kill chain." MATEC Web of Conferences 336 (2021): 02013. http://dx.doi.org/10.1051/matecconf/202133602013.
Full textTung, Shu Chu, Wu Jeng Li, and Shih Miao Huang. "A Web-Based Android Supervisory Control System." Applied Mechanics and Materials 284-287 (January 2013): 3211–15. http://dx.doi.org/10.4028/www.scientific.net/amm.284-287.3211.
Full textCha, Sungyong, Seungsoo Baek, Sooyoung Kang, and Seungjoo Kim. "Security Evaluation Framework for Military IoT Devices." Security and Communication Networks 2018 (July 3, 2018): 1–12. http://dx.doi.org/10.1155/2018/6135845.
Full textArsuaga, Irene, Nerea Toledo, Igor Lopez, and Marina Aguado. "A Framework for Vulnerability Detection in European Train Control Railway Communications." Security and Communication Networks 2018 (2018): 1–9. http://dx.doi.org/10.1155/2018/5634181.
Full textSo, Idris Gautama, N. J. Setiadi, B. Papak, and Rudy Aryanto. "Action Design of Information Systems Security Governance for Bank Using COBIT 4.1 and Control Standard of ISO 27001." Advanced Materials Research 905 (April 2014): 663–68. http://dx.doi.org/10.4028/www.scientific.net/amr.905.663.
Full textLin, Canchu, Anand S. Kunnathur, and Long Li. "The Cultural Foundation of Information Security Behavior." Journal of Database Management 31, no. 2 (April 2020): 21–41. http://dx.doi.org/10.4018/jdm.2020040102.
Full textRen, Junyu, Li Wang, Shaofan Zhang, Yanchun Cai, and Jinfu Chen. "Online Critical Unit Detection and Power System Security Control: An Instance-Level Feature Importance Analysis Approach." Applied Sciences 11, no. 12 (June 12, 2021): 5460. http://dx.doi.org/10.3390/app11125460.
Full textABBASS, Wissam, Zineb BAKRAOUY, Amine BAINA, and Mostafa BELLAFKIH. "Intelligent Risk Management framework." IAES International Journal of Artificial Intelligence (IJ-AI) 8, no. 3 (December 1, 2019): 278. http://dx.doi.org/10.11591/ijai.v8.i3.pp278-285.
Full textZhang, Ke Jun, Biao Liu, Rong Bin Ju, and Rong Qian. "Putting a Terminal Network Access Control System into Practice." Applied Mechanics and Materials 556-562 (May 2014): 5756–60. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5756.
Full textBarni, Mauro, Franco Bartolini, and Teddy Furon. "A general framework for robust watermarking security." Signal Processing 83, no. 10 (October 2003): 2069–84. http://dx.doi.org/10.1016/s0165-1684(03)00168-3.
Full textIlchenko, O. V., and M. Varava. "LEGAL FRAMEWORK FOR SECURITY OF ROAD TRANSPORT: INTERNATIONAL EXPERIENCE." Legal horizons, no. 19 (2019): 138–43. http://dx.doi.org/10.21272/legalhorizons.2019.i19.p138.
Full textSirisha, Mamilla, and Neelam Syamala. "RFID Based Security for Exam Paper Leakage System." International Journal of Engineering & Technology 7, no. 4.36 (December 9, 2018): 841. http://dx.doi.org/10.14419/ijet.v7i4.36.24542.
Full textSuroso, Jarot S. "Implementation of COSO ERM as Security Control Framework in Cloud Service Provider." Journal of Advanced Management Science 5, no. 4 (2017): 322–26. http://dx.doi.org/10.18178/joams.5.4.322-326.
Full textKim, Iksu, and Jongmyung Choi. "Security Framework for Improving the Performance of the Malicious Process Control System." Journal of Korean Society for Internet Information 14, no. 2 (April 30, 2013): 61–71. http://dx.doi.org/10.7472/jksii.2013.14.2.61.
Full textLemaire, Laurens, Jan Vossaert, Joachim Jansen, and Vincent Naessens. "A logic-based framework for the security analysis of Industrial Control Systems." Automatic Control and Computer Sciences 51, no. 2 (March 2017): 114–23. http://dx.doi.org/10.3103/s0146411617020055.
Full textKirilina, T. Yu, E. N. Gorbaneva, and A. V. Poznyakevich. "Legal and regulatory framework of Information security of automated process control systems." Informacionno-technologicheskij vestnik, no. 2 (July 30, 2018): 75–85. http://dx.doi.org/10.21499/2409-1650-2018-2-75-85.
Full textYang, Lili, and S. H. Yang. "A framework of security and safety checking for internet-based control systems." International Journal of Information and Computer Security 1, no. 1/2 (2007): 185. http://dx.doi.org/10.1504/ijics.2007.012249.
Full textPeinado Gomez, German, Jordi Mongay Batalla, Yoan Miche, Silke Holtmanns, Constandinos X. Mavromoustakis, George Mastorakis, and Noman Haider. "Security policies definition and enforcement utilizing policy control function framework in 5G." Computer Communications 172 (April 2021): 226–37. http://dx.doi.org/10.1016/j.comcom.2021.03.024.
Full textHassan, Ahmed, and Waleed Bahgat. "A Framework for Translating a High Level Security Policy into Low Level Security Mechanisms." Journal of Electrical Engineering 61, no. 1 (January 1, 2010): 20–28. http://dx.doi.org/10.2478/v10187-010-0003-x.
Full textKuka, Elda. "AN ANALYTICAL STUDY OF INFORMATION SECURITY MANAGEMENT IN THE PUBLIC SECTOR OF ALBANIA." CBU International Conference Proceedings 6 (September 25, 2018): 277–81. http://dx.doi.org/10.12955/cbup.v6.1169.
Full textSelivanov, S. A., and A. L. Ogarok. "Ensuring cybersecurity of complex information and control systems." Informatization and communication, no. 1 (March 31, 2020): 28–33. http://dx.doi.org/10.34219/2078-8320-2020-11-1-28-33.
Full textKumar, Randhir, and Rakesh Tripathi. "Data Provenance and Access Control Rules for Ownership Transfer Using Blockchain." International Journal of Information Security and Privacy 15, no. 2 (April 2021): 87–112. http://dx.doi.org/10.4018/ijisp.2021040105.
Full textLee, Hyojun, Jiyoung Yoon, Min-Seong Jang, and Kyung-Joon Park. "A Robot Operating System Framework for Secure UAV Communications." Sensors 21, no. 4 (February 15, 2021): 1369. http://dx.doi.org/10.3390/s21041369.
Full text