Academic literature on the topic 'Security of information and communication systems'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security of information and communication systems.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security of information and communication systems"
Masadeh, Shadi R., Shadi Aljawarneh, Ashraf Odeh, and Abdullah Alhaj. "Secure Communication." International Journal of Information Security and Privacy 7, no. 4 (October 2013): 1–10. http://dx.doi.org/10.4018/ijisp.2013100101.
Full textMatrokhina, K. V., A. B. Makhovikov, and E. N. Trofimets. "Ensuring information security in corporate communication systems." E3S Web of Conferences 266 (2021): 09001. http://dx.doi.org/10.1051/e3sconf/202126609001.
Full textWITKOWSKI, Marek. "SECURITY OF ICT SYSTEMS IN CRISIS MANAGEMENT." Scientific Journal of the Military University of Land Forces 162, no. 4 (October 1, 2011): 80–90. http://dx.doi.org/10.5604/01.3001.0002.3179.
Full textGorbenko, I. D., and Yu V. Stasev. "Information security in space communication and control systems." Kosmìčna nauka ì tehnologìâ 2, no. 5-6 (September 30, 1996): 64–68. http://dx.doi.org/10.15407/knit1996.05.064.
Full textRao, Nandan, Shubhra Srivastava, and Sreekanth K.S. "PKI Deployment Challenges and Recommendations for ICS Networks." International Journal of Information Security and Privacy 11, no. 2 (April 2017): 38–48. http://dx.doi.org/10.4018/ijisp.2017040104.
Full textLeines-Vite, Lenin, Juan Carlos Pérez-Arriaga, and Xavier Limón. "Information and Communication Security Mechanisms For Microservices-based Systems." International Journal of Network Security & Its Applications 13, no. 6 (November 30, 2021): 85–103. http://dx.doi.org/10.5121/ijnsa.2021.13607.
Full textKoskosas, Ioannis. "Communicating information systems goals: A case in internet banking security." Computer Science and Information Systems 6, no. 1 (2009): 71–92. http://dx.doi.org/10.2298/csis0901071k.
Full textStanton, Jeffrey M. "Security of Information and Communication Networks." Journal of the American Society for Information Science and Technology 61, no. 5 (November 11, 2009): 1074. http://dx.doi.org/10.1002/asi.21258.
Full textHalaweh, Mohanad. "Users' Perception of Security for Mobile Communication Technology." International Journal of Information Security and Privacy 8, no. 3 (July 2014): 1–12. http://dx.doi.org/10.4018/ijisp.2014070101.
Full textMenkus, Belden. "Information Systems Quality Assurance Enhances Information Systems Security." EDPACS 17, no. 12 (June 1990): 6–10. http://dx.doi.org/10.1080/07366989009450603.
Full textDissertations / Theses on the topic "Security of information and communication systems"
Sarkar, Md Zahurul Islam. "Information-theoretic security in wireless communication systems." Thesis, Queen's University Belfast, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.579767.
Full textGe, Renwei. "Information security in mobile ad hoc networks." Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file 1.57 Mb., 158 p, 2006. http://wwwlib.umi.com/dissertations/fullcit?3220810.
Full textCampbell, Joshua Michael. "How Information and Communication Security Technologies Affect State Power." Malone University Undergraduate Honors Program / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=ma1462540876.
Full textGoméz, Villanueva Daniel. "Secure E-mail System for Cloud Portals : Master Thesis in Information and Communication Systems Security." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-108080.
Full textKoller, Thomas [Verfasser]. "Communication Security for Distributed Mixed-Criticality Systems / Thomas Koller." Aachen : Shaker, 2018. http://d-nb.info/1149615877/34.
Full textMahmood, Ashrafullah Khalid. "Information Security Management of Healthcare System." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4353.
Full textmuqadas@gmail.com
Nilsson, Håkan. "Reliable Communication of Time- and Security-Sensitive Information over a Single Combat Vehicle Network." Thesis, Linköpings universitet, Kommunikationssystem, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-162444.
Full textNguyen, Huy Manh. "MABIC: Mobile Application Builder for Interactive Communication." TopSCHOLAR®, 2016. http://digitalcommons.wku.edu/theses/1747.
Full textAlbehadili, Abdulsahib. "Link-signature in Physical Layer Security and Its Applications for PHY-key Generation, PHY-authentication, and Discriminatory Channel Estimation." University of Toledo / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1588784882183339.
Full textChinnam, S. "MULTI-WAY COMMUNICATION SYSTEM." CSUSB ScholarWorks, 2017. https://scholarworks.lib.csusb.edu/etd/443.
Full textBooks on the topic "Security of information and communication systems"
Belkasmi, Mostafa, Jalel Ben-Othman, Cheng Li, and Mohamed Essaaidi, eds. Advanced Communication Systems and Information Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61143-9.
Full textSchmidt, Andreas U., Giovanni Russello, Antonio Lioy, Neeli R. Prasad, and Shiguo Lian, eds. Security and Privacy in Mobile Information and Communication Systems. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-17502-2.
Full textSchmidt, Andreas U., and Shiguo Lian, eds. Security and Privacy in Mobile Information and Communication Systems. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04434-2.
Full textPrasad, Ramjee, Károly Farkas, Andreas U. Schmidt, Antonio Lioy, Giovanni Russello, and Flaminia L. Luccio, eds. Security and Privacy in Mobile Information and Communication Systems. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30244-2.
Full textSchmidt, Andreas U., Giovanni Russello, Ioannis Krontiris, and Shiguo Lian, eds. Security and Privacy in Mobile Information and Communication Systems. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33392-7.
Full textJerman-Blažič, Borka. Advanced Communications and Multimedia Security: IFIP TC6. Boston, MA: Springer US, 2002.
Find full textIntroduction to communication electronic warfare systems. 2nd ed. Boston: Artech House, 2008.
Find full textVictoria. Office of the Auditor-General. WoVG information security management framework. Melbourne, Vic: Victorian Government Printer, 2013.
Find full textHarkins, Malcolm. Managing Risk and Information Security: Protect to Enable. Berkeley, CA: Apress, 2013.
Find full textP, Shim J., and SpringerLink (Online service), eds. Wireless Technology: Applications, Management, and Security. Boston, MA: Springer-Verlag US, 2009.
Find full textBook chapters on the topic "Security of information and communication systems"
Jajodia, Sushil. "Protecting Critical Information Systems." In Information and Communication Security, 143. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/978-3-540-47942-0_12.
Full textKaryda, Maria, Spyros Kokolakis, and Evangelos Kiountouzis. "Redefining Information Systems Security: Viable Information Systems." In IFIP Advances in Information and Communication Technology, 453–67. Boston, MA: Springer US, 2001. http://dx.doi.org/10.1007/0-306-46998-7_31.
Full textKesdogan, Dogan, Hannes Federrath, Anja Jerichow, and Andreas Pfitzmann. "Location Management Strategies Increasing Privacy in Mobile Communication." In Information Systems Security, 39–48. Boston, MA: Springer US, 1996. http://dx.doi.org/10.1007/978-1-5041-2919-0_4.
Full textMarsalek, Alexander, Bernd Prünster, Bojan Suzic, and Thomas Zefferer. "SeDiCom: A Secure Distributed Privacy-Preserving Communication Platform." In Information Systems Security, 345–63. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-05171-6_18.
Full textVeeningen, Meilof, Benne de Weger, and Nicola Zannone. "Formal Privacy Analysis of Communication Protocols for Identity Management." In Information Systems Security, 235–49. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25560-1_16.
Full textBag, Samiran, Sushmita Ruj, and Bimal Roy. "Jamming Resistant Schemes for Wireless Communication: A Combinatorial Approach." In Information Systems Security, 43–62. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-45204-8_4.
Full textHutchison, Andrew C. M., and Kurt Bauknecht. "Cryptographic key distribution and authentication protocols for secure group communication." In Information Systems Security, 492–93. Boston, MA: Springer US, 1996. http://dx.doi.org/10.1007/978-1-5041-2919-0_46.
Full textBhattacharya, Anup Kumar, Abhijit Das, Dipanwita Roychoudhury, Aravind Iyer, and Debojyoti Bhattacharya. "Autonomous Certification with List-Based Revocation for Secure V2V Communication." In Information Systems Security, 208–22. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35130-3_15.
Full textWeik, Martin H. "information systems security." In Computer Science and Communications Dictionary, 779. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_8970.
Full textBurghouwt, Pieter, Marcel Spruit, and Henk Sips. "Towards Detection of Botnet Communication through Social Media by Monitoring User Activity." In Information Systems Security, 131–43. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25560-1_9.
Full textConference papers on the topic "Security of information and communication systems"
Blasch, Erik P., and Andrew Hoff. "Intelligent communication systems sensor scheduling based on network information." In Defense and Security, edited by Kevin L. Priddy. SPIE, 2004. http://dx.doi.org/10.1117/12.548124.
Full textAkopian, David, Philip Chen, Susheel Miryakar, and Abhinav Kumar. "Fast massive preventive security and information communication systems." In SPIE Defense and Security Symposium, edited by Sos S. Agaian and Sabah A. Jassim. SPIE, 2008. http://dx.doi.org/10.1117/12.777824.
Full textSkaves, Peter. "FAA Aircraft Systems Information Security Protection overview." In 2015 Integrated Communication, Navigation, and Surveillance Conference (ICNS). IEEE, 2015. http://dx.doi.org/10.1109/icnsurv.2015.7121212.
Full textRuhil, Neelam, Jitender Kumar, and Rajesh Kumar. "Information security: In android expedients." In The International Conference on Communication and Computing Systems (ICCCS-2016). Taylor & Francis Group, 6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL 33487-2742: CRC Press, 2016. http://dx.doi.org/10.1201/9781315364094-100.
Full textAlohali, Manal, Nathan Clarke, and Steven Furnell. "Information Security Risk Communication: A User-Centric Approach." In 2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA). IEEE, 2019. http://dx.doi.org/10.1109/aiccsa47632.2019.9035361.
Full textLiu, Xinlin, and Wei Liu. "Information Security Encryption Method for Intelligent Communication Terminal." In ICISCAE 2021: 2021 IEEE 4th International Conference on Information Systems and Computer Aided Education. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3482632.3487531.
Full text"Workshop on future information security 2015." In 2015 7th International Conference on Communication Systems and Networks (COMSNETS). IEEE, 2015. http://dx.doi.org/10.1109/comsnets.2015.7098646.
Full textZhang, Wei, and Thelma Palaoag. "Improving Information Security in Smart City." In 2021 5th International Conference on Communication and Information Systems (ICCIS). IEEE, 2021. http://dx.doi.org/10.1109/iccis53528.2021.9645934.
Full textMisra, Manoj Kumar, Rashi Mathur, and Rishish Tripathi. "On Post Quantum Wireless Communication Security." In 2021 5th International Conference on Information Systems and Computer Networks (ISCON). IEEE, 2021. http://dx.doi.org/10.1109/iscon52037.2021.9702489.
Full textCao, Zhen, Hui Deng, Lu Lu, and Xiaodong Duan. "An information-theoretic security metric for future wireless communication systems." In 2014 XXXIth URSI General Assembly and Scientific Symposium (URSI GASS). IEEE, 2014. http://dx.doi.org/10.1109/ursigass.2014.6929296.
Full textReports on the topic "Security of information and communication systems"
Cuff, Paul. Provable Security of Communication for Protecting Information Flow in Distributed Systems. Fort Belvoir, VA: Defense Technical Information Center, June 2015. http://dx.doi.org/10.21236/ada620103.
Full textBohl, Dwight. Communications and Information. Communications Security: Protected Distribution Systems (PDS). Fort Belvoir, VA: Defense Technical Information Center, December 2000. http://dx.doi.org/10.21236/ada404837.
Full textPerdigão, Rui A. P. Information physics and quantum space technologies for natural hazard sensing, modelling and prediction. Meteoceanics, September 2021. http://dx.doi.org/10.46337/210930.
Full textBraslavskaya, Elena, and Tatyana Pavlova. English for IT-Specialists. SIB-Expertise, June 2021. http://dx.doi.org/10.12731/er0464.21062021.
Full textKucherova, Hanna, Anastasiia Didenko, Olena Kravets, Yuliia Honcharenko, and Aleksandr Uchitel. Scenario forecasting information transparency of subjects' under uncertainty and development of the knowledge economy. [б. в.], October 2020. http://dx.doi.org/10.31812/123456789/4469.
Full textGrance, T., J. Hash, S. Peck, J. Smith, and K. Korow-Diks. Security guide for interconnecting information technology systems. Gaithersburg, MD: National Institute of Standards and Technology, 2002. http://dx.doi.org/10.6028/nist.sp.800-47.
Full textSwanson, M., N. Bartol, J. Sabato, J. Hash, and L. Graffo. Security metrics guide for information technology systems. Gaithersburg, MD: National Institute of Standards and Technology, 2003. http://dx.doi.org/10.6028/nist.sp.800-55.
Full textYeo, Tat S., and Xudong Chen. Establishing Information Security Systems via Optical Imaging. Fort Belvoir, VA: Defense Technical Information Center, August 2015. http://dx.doi.org/10.21236/ada623481.
Full textDempsey, K. L., N. S. Chawla, L. A. Johnson, R. Johnston, A. C. Jones, A. D. Orebaugh, M. A. Scholl, and K. M. Stine. Information Security Continuous Monitoring (ISCM) for federal information systems and organizations. Gaithersburg, MD: National Institute of Standards and Technology, 2011. http://dx.doi.org/10.6028/nist.sp.800-137.
Full textSwanson, Marianne. Security self-assessment guide for information technology systems. Gaithersburg, MD: National Institute of Standards and Technology, 2001. http://dx.doi.org/10.6028/nist.sp.800-26.
Full text