Academic literature on the topic 'Security of information and communication systems'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security of information and communication systems.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Security of information and communication systems"

1

Masadeh, Shadi R., Shadi Aljawarneh, Ashraf Odeh, and Abdullah Alhaj. "Secure Communication." International Journal of Information Security and Privacy 7, no. 4 (October 2013): 1–10. http://dx.doi.org/10.4018/ijisp.2013100101.

Full text
Abstract:
The idea of e-Commerce is to take advantage of all the possibilities offered by information technology (such as digital communications, multimedia, internet, cell phones, teleconferences, etc.) and to improve the security of various organizations. In the article, the authors focus on securing all the contents of e-Commerce by proposing a public key watermarking algorithm for web content integrity verification. The main purpose of this article is to present a new security system that enables e-Commerce to exchange data more securely and by altering the file content structure, detecting illegal access and stopping the illegal operation. Such system combines the watermarking techniques with the cryptography methods in order to provide the highest visible security component that influences on the end user through its daily payment interaction with business.
APA, Harvard, Vancouver, ISO, and other styles
2

Matrokhina, K. V., A. B. Makhovikov, and E. N. Trofimets. "Ensuring information security in corporate communication systems." E3S Web of Conferences 266 (2021): 09001. http://dx.doi.org/10.1051/e3sconf/202126609001.

Full text
Abstract:
The paper considers a secure information transfer protocol for corporate IP-telephony system. In the article are analized the advantages and disadvantages of the known protocols. A description of the process of establishing a connection, sending text messages and voice communication in the developed protocol is given. Its practical significance and expediency of use are described.
APA, Harvard, Vancouver, ISO, and other styles
3

WITKOWSKI, Marek. "SECURITY OF ICT SYSTEMS IN CRISIS MANAGEMENT." Scientific Journal of the Military University of Land Forces 162, no. 4 (October 1, 2011): 80–90. http://dx.doi.org/10.5604/01.3001.0002.3179.

Full text
Abstract:
The article presents ICT (Information and Communication Technology) networks and systems that are used to provide communications for crisis management purposes. The articles describes wired and wireless communication assets and discusses their advantages and disadvantages when they are used to carry out national security tasks.
APA, Harvard, Vancouver, ISO, and other styles
4

Gorbenko, I. D., and Yu V. Stasev. "Information security in space communication and control systems." Kosmìčna nauka ì tehnologìâ 2, no. 5-6 (September 30, 1996): 64–68. http://dx.doi.org/10.15407/knit1996.05.064.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rao, Nandan, Shubhra Srivastava, and Sreekanth K.S. "PKI Deployment Challenges and Recommendations for ICS Networks." International Journal of Information Security and Privacy 11, no. 2 (April 2017): 38–48. http://dx.doi.org/10.4018/ijisp.2017040104.

Full text
Abstract:
Different types of Control Systems used for Industrial production are broadly called Industrial Control Systems (ICS) (n.d.). These include Supervisory Control and Data Acquisition (SCADA) Systems and Distributed Control Systems (DCS). ICS typically perform the “Command and Control” operations required for smooth functioning of machines in industrial production. They are widely used in Critical infrastructures such as power generation and distribution systems, Oil and Gas plants, Chemical factories and various other manufacturing facilities. Traditionally, ICS used proprietary protocols and operated in isolation. Perimeter security was considered enough as the only means to compromise these systems was via physical access to the systems. However, increased standardization, open architecture adoption and connectivity to enterprise networks as well as internet opened up these systems for a wide range of audience and enabled remote attacks. In this new operation landscape, it is imperative that newer means of securing the networks are adopted continuously. One of the security considerations for the ICS networks is the communication paths used by these networks. Public Key Infrastructure (PKI) (n.d.) plays a key role in securing the communication of ICS networks. Using Digital Certificates, PKI provides a mechanism to verify the identity of all the entities on a network and also ensures that the information is shared securely between communicating entities. PKI is a proven mechanism for secure communication and is widely used in many organizations. However, PKI as a solution to ICS security is challenging due to factors such as resource constrained environments, bandwidth considerations and hard real-time communication requirements. This paper intends to focus on key challenges in Digital Certificate management and correct deployment of PKI in ICS networks and will also present recommendations to overcome these challenges without compromising the basic functionalities of ICS.
APA, Harvard, Vancouver, ISO, and other styles
6

Leines-Vite, Lenin, Juan Carlos Pérez-Arriaga, and Xavier Limón. "Information and Communication Security Mechanisms For Microservices-based Systems." International Journal of Network Security & Its Applications 13, no. 6 (November 30, 2021): 85–103. http://dx.doi.org/10.5121/ijnsa.2021.13607.

Full text
Abstract:
Security has become paramount in modern software services as more and more security breaches emerge, impacting final users and organizations alike. Trends like the Microservice Architecture bring new security challenges related to communication, system design, development, and operation. The literature presents a plethora of security-related solutions for microservices-based systems, but the spread of information difficult practitioners' adoption of novel security related solutions. In this study, we aim to present a catalogue and discussion of security solutions based on algorithms, protocols, standards, or implementations; supporting principles or characteristics of information security, considering the three possible states of data, according to the McCumber Cube. Our research follows a Systematic Literature Review, synthesizing the results with a meta-aggregation process. We identified a total of 30 primary studies, yielding 75 security solutions for the communication of microservices.
APA, Harvard, Vancouver, ISO, and other styles
7

Koskosas, Ioannis. "Communicating information systems goals: A case in internet banking security." Computer Science and Information Systems 6, no. 1 (2009): 71–92. http://dx.doi.org/10.2298/csis0901071k.

Full text
Abstract:
A large part of information systems (IS) security approaches is technical in nature with less consideration on people and organizational issues. The research presented in this paper adopts a broader perspective and presents an understanding of IS security in terms of a social and organizational perspective. In doing so, it uses the communication of risk messages among the members of IT groups in setting Internet banking goals in order to identify any weaknesses in security management procedures. The novel approach of this investigation is that explores and presents the issues of risk communication and goal setting in Internet banking security through indepth interviews within three case studies. That said, it promotes an interdisciplinary and inter-organizational theory which fosters a new dialog that transcends security industry specific contexts as opposed to other studies. Interview results suggest how an effective setting of Internet banking security goals can be achieved through specific considerations for improving the communication of security messages. The research contributes to interpretive information systems with the study of risk communication and goal setting in an Internet banking security context.
APA, Harvard, Vancouver, ISO, and other styles
8

Stanton, Jeffrey M. "Security of Information and Communication Networks." Journal of the American Society for Information Science and Technology 61, no. 5 (November 11, 2009): 1074. http://dx.doi.org/10.1002/asi.21258.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Halaweh, Mohanad. "Users' Perception of Security for Mobile Communication Technology." International Journal of Information Security and Privacy 8, no. 3 (July 2014): 1–12. http://dx.doi.org/10.4018/ijisp.2014070101.

Full text
Abstract:
Security perception has been investigated by much research within the e-commerce and e-banking context. However, very little research has investigated this issue within the general mobile context without limiting this to particular applications such as payment, marketing, banking and commerce. Therefore, this paper aims to explore the users' perception of security towards mobile phones from a wide perspective. An interpretive-qualitative research was adopted to investigate the users' perceptions. The research results provided evidence for extending the meaning of the security perception concept to include human security as a relevant issue to mobile phone usage. It also showed that mobile phones can be used as an instrument to commit fraud and crimes. Furthermore, the results showed that the development of mobile technology raises new security and privacy concerns. For practical implications, this research provides recommendations for mobile technology designers to improve mobile usability- related issues in order to improve users' feeling of security
APA, Harvard, Vancouver, ISO, and other styles
10

Menkus, Belden. "Information Systems Quality Assurance Enhances Information Systems Security." EDPACS 17, no. 12 (June 1990): 6–10. http://dx.doi.org/10.1080/07366989009450603.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Security of information and communication systems"

1

Sarkar, Md Zahurul Islam. "Information-theoretic security in wireless communication systems." Thesis, Queen's University Belfast, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.579767.

Full text
Abstract:
The security in wireless communication networks is an important issue due to the mobility of users and network components, and the fact that the wireless medium is susceptible to eavesdropping and fraud. Motivated by the importance of security in the wireless communication networks, we study the secrecy capacity and secure outage performance of wireless channels in the presence of single as well as multiple eavesdroppers. At first, we study the effect of fading on the secrecy capacity and see, how we can achieve high data rates with reliability in spite of harsh wireless channel subject to the fading. Then, we study the effect of correlation on the secrecy capacity and quantify the loss of secrecy capacity of fading channels due to correlation. Since, the diversity is traditionally exploited to combat the fading in wireless systems. Therefore; secondly, we study the effect of channel diversity on the secrecy capacity of fading channels. This study is also useful to see, how we can overcome the loss of secrecy capacity due to correlation and obtain the target secrecy rate by improving the capacity of main channel exploiting diversity combining. We also investigate the effect of spatial multiplexing on the secrecy capacity and secure outage performance of keyhole multiple-input multiple-output (MIMO) channel. In addition, an achievable secrecy capacity region is developed using secret dirty-paper coding (SDPC) scheme to study the effect of transmit diversity on the secrecy capacity. Since, the group-oriented applications often require same data to be conveyed to multiple users simultaneously, and the traditional multicasting does not provide a secure framework for authentication and privacy for multicast sessions, the lack of which is currently preventing the large-scale deployment of group-oriented applications. Therefore, finally we study secure wireless multicasting and investigate the effect of fading and channel diversity on the secrecy multicast capacity.
APA, Harvard, Vancouver, ISO, and other styles
2

Ge, Renwei. "Information security in mobile ad hoc networks." Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file 1.57 Mb., 158 p, 2006. http://wwwlib.umi.com/dissertations/fullcit?3220810.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Campbell, Joshua Michael. "How Information and Communication Security Technologies Affect State Power." Malone University Undergraduate Honors Program / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=ma1462540876.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Goméz, Villanueva Daniel. "Secure E-mail System for Cloud Portals : Master Thesis in Information and Communication Systems Security." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-108080.

Full text
Abstract:
Email is a well established technology used worldwide for enterprise and private communication through the Internet. It allows people to communicate using text, but also other information formats used either as HTML or attached files. The communication is performed without the need of synchronized endpoints, based on the use of email servers that take care of storing and forwarding email letters. All these properties and much more standardized ones do not include security, which makes the choice of service provider hard when the letters sent in the email system include sensitive information. In the last few years there has been a big interest and growth in the area of cloud computing. Placing resources (computers, applications, information) out of local environments, thanks to the high speed connections in the Internet, provides countless possibilities. Actually, even email systems can be deployed in cloud computing environments, including all the email services (interface, client, and server) or a part of them. From a security point of view, the use of cloud computing leads to many threats generated by external parties and even the cloud providers. Because of these reasons, this work intends to present an innovative approach to security in a cloud environment, focusing on the security of an email system. The purpose is to find a solution for an email system deployable in a cloud environment, with all the functionality deployed on a external machine. This email system must be completely protected, minimizing the actions taken by the user, which should just connect to a portal through a web browser. Along this report there are details about the foundations, progress and findings of the research that has been carried out. The main objectives involve: researching on the concepts and state of the art of cloud computing, email systems and security; presenting a cloud computing architecture that will take care of the general aspects of security; designing an email system for that architecture that contains mechanisms protecting it from the possible security threats; and finally, implementing a simplified version of the design to test and prove the feasibility of it. After all the mentioned activities, the findings are commented, mentioning the applicability of research results to the current situation. Obviously, there is place for more research in depth of several topics related to cloud computing and email, that is why some of them are suggested.
APA, Harvard, Vancouver, ISO, and other styles
5

Koller, Thomas [Verfasser]. "Communication Security for Distributed Mixed-Criticality Systems / Thomas Koller." Aachen : Shaker, 2018. http://d-nb.info/1149615877/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mahmood, Ashrafullah Khalid. "Information Security Management of Healthcare System." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4353.

Full text
Abstract:
Information security has significant role in Healthcare organizations. The Electronic Health Record (EHR) with patient’s information is considered as very sensitive in Healthcare organization. Sensitive information of patients in healthcare has to be managed such that it is safe and secure from unauthorized access. The high-level quality care to patients is possible if healthcare management system is able to provide right information in right time to right place. Availability and accessibility are significant aspects of information security, where applicable information needs to be available and accessible for user within the healthcare organization as well as across organizational borders. At the same time, it is essentials to protect the patient security from unauthorized access and maintain the appropriate level in health care regarding information security. The aim of this thesis is to explore current management of information security in terms of Electronic Health Records (EHR) and how these are protected from possible security threats and risks in healthcare, when the sensitive information has to be communicated among different actors in healthcare as well as across borders. The Blekinge health care system was investigated through case study with conduction of several interviews to discover possible issues, concerning security threats to management of healthcare. The theoretical work was the framework and support for possible solutions of identified security risks and threats in Blekinge healthcare. At the end after mapping, the whole process possible guidelines and suggestions were recommended for healthcare in order to prevent the sensitive information from unauthorized access and maintain information security. The management of technical and administrative bodies was explored for security problems. It has main role to healthcare and in general, whole business is the responsibility of this management to manage the sensitive information of patients. Consequently, Blekinge healthcare was investigated for possible issues and some possible guidelines and suggestions in order to improve the current information security with prevention of necessary risks to healthcare sensitive information.
muqadas@gmail.com
APA, Harvard, Vancouver, ISO, and other styles
7

Nilsson, Håkan. "Reliable Communication of Time- and Security-Sensitive Information over a Single Combat Vehicle Network." Thesis, Linköpings universitet, Kommunikationssystem, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-162444.

Full text
Abstract:
A common trend, in general as well as in the field of combat vehicles, is the rapidly increasing demand for data network capacity and even more in transferred data. To handle this increased demand, different countries with their armed forces and equipment manufacturers evaluate methods to increase the data transmission capacity in combat vehicles. The different types of transmitted data are of different criticality and have different security demands. An easy solution to this is to have separated networks for each type of traffic, but that is quite expensive and uses a lot of hardware. This thesis focuses on a different solution, with a shared network for all types of data transmissions. This is done by evaluating different types of data networks and add-on protocols and then testing the networks practically with varying transmission rates. In the thesis, all the practical testing is done with data networks according to the Ethernet standard, which is the standard evaluated with a throughput that is high enough for the use case. Ethernet as a standard is not suitable for critical data traffic and therefore add-on protocols for Ethernet to optimize the system for critical data traffic are tested. With these optimizations made, Ethernet can be considered more suitable for critical traffic, but this depends entirely on the system requirements.
APA, Harvard, Vancouver, ISO, and other styles
8

Nguyen, Huy Manh. "MABIC: Mobile Application Builder for Interactive Communication." TopSCHOLAR®, 2016. http://digitalcommons.wku.edu/theses/1747.

Full text
Abstract:
Nowadays, the web services and mobile technology advance to a whole new level. These technologies make the modern communication faster and more convenient than the traditional way. People can also easily share data, picture, image and video instantly. It also saves time and money. For example: sending an email or text message is cheaper and faster than a letter. Interactive communication allows the instant exchange of feedback and enables two-way communication between people and people, or people and computer. It increases the engagement of sender and receiver in communication. Although many systems such as REDCap and Taverna are built for improving the interactive communication between the servers and clients, there are still common drawbacks existing in these systems. These systems lack the support of the branching logic and two-way communication. They also require administrator’s programming skills to function the system adequately. These issues are the motivation of the project. The goal is to build a framework to speed up the prototype development of mobile application. The MABIC support the complex workflow by providing conditional logic, instantaneous interactivity between the administrators and participants and the mobility. These supported features of MABIC improve the interaction because it engages the participants to communicate more with the system. MABIC system provides the mobile electronic communication via sending a text message or pushing a notification to mobile’s device. Moreover, MABIC application also supports multiple mobile platforms. It helps to reduce the time and cost of development. In this thesis, the overview of MABIC system, its implementation, and related application is described.
APA, Harvard, Vancouver, ISO, and other styles
9

Albehadili, Abdulsahib. "Link-signature in Physical Layer Security and Its Applications for PHY-key Generation, PHY-authentication, and Discriminatory Channel Estimation." University of Toledo / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1588784882183339.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chinnam, S. "MULTI-WAY COMMUNICATION SYSTEM." CSUSB ScholarWorks, 2017. https://scholarworks.lib.csusb.edu/etd/443.

Full text
Abstract:
Videoconferencing is increasingly becoming a trend worldwide in applications where clients need to access lectures, meeting proceedings, communicating with family and friends etc. It provides a platform enabling the visual, audio and video communication between clients. The aim of this project is to utilize the open source Java software to build a desktop application enabling communication between clients. When a user needs to transfer a secured file, it’s unsafe to send it using social networking sites because of lack of security. So, with the “Multi-Way Communication System” (MWCS) we resolve some security issues. The MWCS is a highly secure way for file transfer, text and video conferencing.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Security of information and communication systems"

1

Belkasmi, Mostafa, Jalel Ben-Othman, Cheng Li, and Mohamed Essaaidi, eds. Advanced Communication Systems and Information Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61143-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Schmidt, Andreas U., Giovanni Russello, Antonio Lioy, Neeli R. Prasad, and Shiguo Lian, eds. Security and Privacy in Mobile Information and Communication Systems. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-17502-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Schmidt, Andreas U., and Shiguo Lian, eds. Security and Privacy in Mobile Information and Communication Systems. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04434-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Prasad, Ramjee, Károly Farkas, Andreas U. Schmidt, Antonio Lioy, Giovanni Russello, and Flaminia L. Luccio, eds. Security and Privacy in Mobile Information and Communication Systems. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30244-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Schmidt, Andreas U., Giovanni Russello, Ioannis Krontiris, and Shiguo Lian, eds. Security and Privacy in Mobile Information and Communication Systems. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33392-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jerman-Blažič, Borka. Advanced Communications and Multimedia Security: IFIP TC6. Boston, MA: Springer US, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Introduction to communication electronic warfare systems. 2nd ed. Boston: Artech House, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Victoria. Office of the Auditor-General. WoVG information security management framework. Melbourne, Vic: Victorian Government Printer, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Harkins, Malcolm. Managing Risk and Information Security: Protect to Enable. Berkeley, CA: Apress, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

P, Shim J., and SpringerLink (Online service), eds. Wireless Technology: Applications, Management, and Security. Boston, MA: Springer-Verlag US, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Security of information and communication systems"

1

Jajodia, Sushil. "Protecting Critical Information Systems." In Information and Communication Security, 143. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/978-3-540-47942-0_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Karyda, Maria, Spyros Kokolakis, and Evangelos Kiountouzis. "Redefining Information Systems Security: Viable Information Systems." In IFIP Advances in Information and Communication Technology, 453–67. Boston, MA: Springer US, 2001. http://dx.doi.org/10.1007/0-306-46998-7_31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kesdogan, Dogan, Hannes Federrath, Anja Jerichow, and Andreas Pfitzmann. "Location Management Strategies Increasing Privacy in Mobile Communication." In Information Systems Security, 39–48. Boston, MA: Springer US, 1996. http://dx.doi.org/10.1007/978-1-5041-2919-0_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Marsalek, Alexander, Bernd Prünster, Bojan Suzic, and Thomas Zefferer. "SeDiCom: A Secure Distributed Privacy-Preserving Communication Platform." In Information Systems Security, 345–63. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-05171-6_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Veeningen, Meilof, Benne de Weger, and Nicola Zannone. "Formal Privacy Analysis of Communication Protocols for Identity Management." In Information Systems Security, 235–49. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25560-1_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bag, Samiran, Sushmita Ruj, and Bimal Roy. "Jamming Resistant Schemes for Wireless Communication: A Combinatorial Approach." In Information Systems Security, 43–62. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-45204-8_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hutchison, Andrew C. M., and Kurt Bauknecht. "Cryptographic key distribution and authentication protocols for secure group communication." In Information Systems Security, 492–93. Boston, MA: Springer US, 1996. http://dx.doi.org/10.1007/978-1-5041-2919-0_46.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bhattacharya, Anup Kumar, Abhijit Das, Dipanwita Roychoudhury, Aravind Iyer, and Debojyoti Bhattacharya. "Autonomous Certification with List-Based Revocation for Secure V2V Communication." In Information Systems Security, 208–22. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35130-3_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Weik, Martin H. "information systems security." In Computer Science and Communications Dictionary, 779. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_8970.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Burghouwt, Pieter, Marcel Spruit, and Henk Sips. "Towards Detection of Botnet Communication through Social Media by Monitoring User Activity." In Information Systems Security, 131–43. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25560-1_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Security of information and communication systems"

1

Blasch, Erik P., and Andrew Hoff. "Intelligent communication systems sensor scheduling based on network information." In Defense and Security, edited by Kevin L. Priddy. SPIE, 2004. http://dx.doi.org/10.1117/12.548124.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Akopian, David, Philip Chen, Susheel Miryakar, and Abhinav Kumar. "Fast massive preventive security and information communication systems." In SPIE Defense and Security Symposium, edited by Sos S. Agaian and Sabah A. Jassim. SPIE, 2008. http://dx.doi.org/10.1117/12.777824.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Skaves, Peter. "FAA Aircraft Systems Information Security Protection overview." In 2015 Integrated Communication, Navigation, and Surveillance Conference (ICNS). IEEE, 2015. http://dx.doi.org/10.1109/icnsurv.2015.7121212.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ruhil, Neelam, Jitender Kumar, and Rajesh Kumar. "Information security: In android expedients." In The International Conference on Communication and Computing Systems (ICCCS-2016). Taylor & Francis Group, 6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL 33487-2742: CRC Press, 2016. http://dx.doi.org/10.1201/9781315364094-100.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Alohali, Manal, Nathan Clarke, and Steven Furnell. "Information Security Risk Communication: A User-Centric Approach." In 2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA). IEEE, 2019. http://dx.doi.org/10.1109/aiccsa47632.2019.9035361.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Liu, Xinlin, and Wei Liu. "Information Security Encryption Method for Intelligent Communication Terminal." In ICISCAE 2021: 2021 IEEE 4th International Conference on Information Systems and Computer Aided Education. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3482632.3487531.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

"Workshop on future information security 2015." In 2015 7th International Conference on Communication Systems and Networks (COMSNETS). IEEE, 2015. http://dx.doi.org/10.1109/comsnets.2015.7098646.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zhang, Wei, and Thelma Palaoag. "Improving Information Security in Smart City." In 2021 5th International Conference on Communication and Information Systems (ICCIS). IEEE, 2021. http://dx.doi.org/10.1109/iccis53528.2021.9645934.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Misra, Manoj Kumar, Rashi Mathur, and Rishish Tripathi. "On Post Quantum Wireless Communication Security." In 2021 5th International Conference on Information Systems and Computer Networks (ISCON). IEEE, 2021. http://dx.doi.org/10.1109/iscon52037.2021.9702489.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cao, Zhen, Hui Deng, Lu Lu, and Xiaodong Duan. "An information-theoretic security metric for future wireless communication systems." In 2014 XXXIth URSI General Assembly and Scientific Symposium (URSI GASS). IEEE, 2014. http://dx.doi.org/10.1109/ursigass.2014.6929296.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Security of information and communication systems"

1

Cuff, Paul. Provable Security of Communication for Protecting Information Flow in Distributed Systems. Fort Belvoir, VA: Defense Technical Information Center, June 2015. http://dx.doi.org/10.21236/ada620103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bohl, Dwight. Communications and Information. Communications Security: Protected Distribution Systems (PDS). Fort Belvoir, VA: Defense Technical Information Center, December 2000. http://dx.doi.org/10.21236/ada404837.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Perdigão, Rui A. P. Information physics and quantum space technologies for natural hazard sensing, modelling and prediction. Meteoceanics, September 2021. http://dx.doi.org/10.46337/210930.

Full text
Abstract:
Disruptive socio-natural transformations and climatic change, where system invariants and symmetries break down, defy the traditional complexity paradigms such as machine learning and artificial intelligence. In order to overcome this, we introduced non-ergodic Information Physics, bringing physical meaning to inferential metrics, and a coevolving flexibility to the metrics of information transfer, resulting in new methods for causal discovery and attribution. With this in hand, we develop novel dynamic models and analysis algorithms natively built for quantum information technological platforms, expediting complex system computations and rigour. Moreover, we introduce novel quantum sensing technologies in our Meteoceanics satellite constellation, providing unprecedented spatiotemporal coverage, resolution and lead, whilst using exclusively sustainable materials and processes across the value chain. Our technologies bring out novel information physical fingerprints of extreme events, with recently proven records in capturing early warning signs for extreme hydro-meteorologic events and seismic events, and do so with unprecedented quantum-grade resolution, robustness, security, speed and fidelity in sensing, processing and communication. Our advances, from Earth to Space, further provide crucial predictive edge and added value to early warning systems of natural hazards and long-term predictions supporting climatic security and action.
APA, Harvard, Vancouver, ISO, and other styles
4

Braslavskaya, Elena, and Tatyana Pavlova. English for IT-Specialists. SIB-Expertise, June 2021. http://dx.doi.org/10.12731/er0464.21062021.

Full text
Abstract:
The course is designed in the e-learning environment LMS MOODLE AND INTENDED FOR REMOTE SUPPORT of the 2d-year students' INDEPENDENT WORK IN THE DISCIPLINE «ENGLISH language» of the institute of radio electronics and information security and the Institute of Information Technology and Management in technical systems in Sevsu. The aim of the course is the bachelor training, who can speak foreign language in various situations of interpersonal and professional communication at the level of at least B1+ according to the international scale EVALUATION; IMPROVING THE INITIAL FOREIGN LANGUAGE level reached at previous levels of education; mastering of the necessary and sufficient level of competence FOR SOLVING SOCIO-COMMUNICATIVE TASKS IN VARIOUS spheres OF PROFESSIONAL AND SCIENTIFIC ACTIVITIES WHEN COMMUNICATING WITH FOREIGN PARTNERS; FURTHER SELF-EDUCATION.
APA, Harvard, Vancouver, ISO, and other styles
5

Kucherova, Hanna, Anastasiia Didenko, Olena Kravets, Yuliia Honcharenko, and Aleksandr Uchitel. Scenario forecasting information transparency of subjects' under uncertainty and development of the knowledge economy. [б. в.], October 2020. http://dx.doi.org/10.31812/123456789/4469.

Full text
Abstract:
Topicality of modeling information transparency is determined by the influence it has on the effectiveness of management decisions made by an economic entity in the context of uncertainty and information asymmetry. It has been found that information transparency is a poorly structured category which acts as a qualitative characteristic of information and at certain levels forms an additional spectrum of properties of the information that has been adequately perceived or processed. As a result of structuring knowledge about the factor environment, a fuzzy cognitive model of information transparency was constructed in the form of a weighted digraph. Structural analysis and scenario forecasting of optimal alternatives of the fuzzy cognitive model made it possible to evaluate the classes of factors, identify their limited relations, establish the centrality of the roles of information transparency and information and communication security in the system built and evaluate their importance when modeling the situation self-development. Information visibility, reliability and availability have been found to have the strongest impact on the system. Taking into account different initial weights of the key factors — information transparency and information and communication security — the study substantiates the strategic ways for economic entities to achieve their goals in the context of uncertainty and information asymmetry, which allows us to use this approach as a tool for strategic management in the information environment.
APA, Harvard, Vancouver, ISO, and other styles
6

Grance, T., J. Hash, S. Peck, J. Smith, and K. Korow-Diks. Security guide for interconnecting information technology systems. Gaithersburg, MD: National Institute of Standards and Technology, 2002. http://dx.doi.org/10.6028/nist.sp.800-47.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Swanson, M., N. Bartol, J. Sabato, J. Hash, and L. Graffo. Security metrics guide for information technology systems. Gaithersburg, MD: National Institute of Standards and Technology, 2003. http://dx.doi.org/10.6028/nist.sp.800-55.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yeo, Tat S., and Xudong Chen. Establishing Information Security Systems via Optical Imaging. Fort Belvoir, VA: Defense Technical Information Center, August 2015. http://dx.doi.org/10.21236/ada623481.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Dempsey, K. L., N. S. Chawla, L. A. Johnson, R. Johnston, A. C. Jones, A. D. Orebaugh, M. A. Scholl, and K. M. Stine. Information Security Continuous Monitoring (ISCM) for federal information systems and organizations. Gaithersburg, MD: National Institute of Standards and Technology, 2011. http://dx.doi.org/10.6028/nist.sp.800-137.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Swanson, Marianne. Security self-assessment guide for information technology systems. Gaithersburg, MD: National Institute of Standards and Technology, 2001. http://dx.doi.org/10.6028/nist.sp.800-26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography