Academic literature on the topic 'System and network security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'System and network security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "System and network security"
Zhou, Wanlei, and Yang Xiang. "Network and system security." Journal of Network and Computer Applications 32, no. 2 (March 2009): 345–46. http://dx.doi.org/10.1016/j.jnca.2008.06.001.
Full textHe, Shen, Jing Huang, and Penglin Yang. "Build with intrinsic security: Trusted autonomy security system." International Journal of Distributed Sensor Networks 16, no. 11 (November 2020): 155014772097453. http://dx.doi.org/10.1177/1550147720974535.
Full textGanzhur, M. A., and A. I. Bryukhovetsky. "Network security systems." Herald of Dagestan State Technical University. Technical Sciences 49, no. 3 (November 8, 2022): 61–67. http://dx.doi.org/10.21822/2073-6185-2022-49-3-61-67.
Full textMegat Mohamed Noor, Megat Norulazmi. "Community based home security system using wireless mesh network." International Journal of Academic Research 5, no. 5 (October 10, 2013): 73–79. http://dx.doi.org/10.7813/2075-4124.2013/5-5/a.9.
Full textKozlov, Dmitriy, and Natalia Sadovnikova. "Security System of POS-Network." NBI Technologies 14, no. 1 (September 2020): 6–10. http://dx.doi.org/10.15688/nbit.jvolsu.2020.1.1.
Full textAdamczyk, Piotr, Grzegorz Kiryk, Jarosław Napiórkowski, and Andrzej Walczak. "Network model of security system." MATEC Web of Conferences 76 (2016): 02002. http://dx.doi.org/10.1051/matecconf/20167602002.
Full textWhite, Gregory B., Eric A. Fisch, and Udo W. Pooch. "Computer System and Network Security." EDPACS 25, no. 8 (February 1998): 12–13. http://dx.doi.org/10.1201/1079/43236.25.8.19980201/30188.4.
Full textRöpke, Christian, and Thorsten Holz. "On network operating system security." International Journal of Network Management 26, no. 1 (November 11, 2015): 6–24. http://dx.doi.org/10.1002/nem.1918.
Full textMcDonald, Kenneth, Joshua Akers, Forrest Bartz, Daniel Beck, Israel Castro, and LTC Robert Prins. "Food Security Network Modeling." Industrial and Systems Engineering Review 4, no. 2 (November 12, 2016): 114–30. http://dx.doi.org/10.37266/iser.2016v4i2.pp114-130.
Full textB N, Mangalagowri, and Dr N. Sandeep Varma. "Intrusion Detection System of IPv6 Network." International Journal for Research in Applied Science and Engineering Technology 10, no. 9 (September 30, 2022): 1267–74. http://dx.doi.org/10.22214/ijraset.2022.46628.
Full textDissertations / Theses on the topic "System and network security"
Yucel, Okan. "Information System Security." Master's thesis, METU, 2003. http://etd.lib.metu.edu.tr/upload/4/1260303/index.pdf.
Full textMantere, M. (Matti). "Network security monitoring and anomaly detection in industrial control system networks." Doctoral thesis, Oulun yliopisto, 2015. http://urn.fi/urn:isbn:9789526208152.
Full textTiivistelmä Kehittyneet yhteiskunnat käyttävät teollisuuslaitoksissaan ja infrastruktuuriensa operoinnissa monimuotoisia automaatiojärjestelmiä. Näiden automaatiojärjestelmien tieto- ja kyberturvallisuuden tila on hyvin vaihtelevaa. Laitokset ja niiden hyödyntämät järjestelmät voivat edustaa usean eri aikakauden tekniikkaa ja sisältää useiden eri aikakauden heikkouksia ja haavoittuvaisuuksia. Järjestelmät olivat aiemmin suhteellisen eristyksissä muista tietoverkoista kuin omista kommunikaatioväylistään. Tämä automaatiojärjestelmien eristyneisyyden heikkeneminen on luonut uuden joukon uhkia paljastamalla niiden kommunikaatiorajapintoja ympäröivälle maailmalle. Nämä verkkoympäristöt ovat kuitenkin edelleen verrattaen eristyneitä ja tätä ominaisuutta voidaan hyödyntää niiden valvonnassa. Tässä työssä esitetään tutkimustuloksia näiden verkkojen turvallisuuden valvomisesta erityisesti poikkeamien havainnoinnilla käyttäen hyväksi koneoppimismenetelmiä. Alkuvaiheen haasteiden ja erityispiirteiden tutkimuksen jälkeen työssä käytetään itsejärjestyvien karttojen (Self-Organizing Map, SOM) algoritmia esimerkkiratkaisun toteutuksessa uuden konseptin havainnollistamiseksi. Tämä uusi konsepti on tapahtumapohjainen koneoppiva poikkeamien havainnointi (Event-Driven Machine Learning Anomaly Detection, EMLAD). Työn kontribuutiot ovat seuraavat, kaikki teollisuusautomaatioverkkojen kontekstissa: ehdotus yhdeksi anomalioiden havainnoinnissa käytettävien ominaisuuksien ryhmäksi, koneoppivan poikkeamien havainnoinnin käyttökelpoisuuden toteaminen, laajennettava ja joustava esimerkkitoteutus uudesta EMLAD-konseptista toteutettuna Bro NSM työkalun ohjelmointikielellä
Coffey, Thomas. "A distributed global-wide security system." Thesis, University of Ulster, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.260989.
Full textScully, Michael N. B. "Network and system security in an information age." Honors in the Major Thesis, University of Central Florida, 2000. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/204.
Full textBachelors
Business Administration
Management Information Systems
Benbrook, Jimmie Glen 1943. "A SYSTEM ANALYSIS OF A MULTILEVEL SECURE LOCAL AREA NETWORK (COMPUTER)." Thesis, The University of Arizona, 1986. http://hdl.handle.net/10150/275531.
Full textLessner, Dirk. "Network security for embedded systems /." [St. Lucia, Qld.], 2005. http://adt.library.uq.edu.au/public/adt-QU20060215.160952/index.html.
Full textBurchett, Ian. "Quantifying Computer Network Security." TopSCHOLAR®, 2011. http://digitalcommons.wku.edu/theses/1118.
Full textSong, Zixuan. "A Network based Home surveillance/ monitoring system : Router based Deployment and Network Security." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-47314.
Full textWang, Haiyuan. "Security Architecture for the TEAMDEC System." Thesis, Virginia Tech, 1999. http://hdl.handle.net/10919/9778.
Full textMaster of Science
Onder, Hulusi. "A Security Management System Design." Thesis, METU, 2007. http://etd.lib.metu.edu.tr/upload/12608515/index.pdf.
Full textBooks on the topic "System and network security"
Vacca, John R. Network and system security. Burlington, MA: Syngress/Elsevier, 2010.
Find full textNetwork and system security. Burlington, MA: Syngress, 2010.
Find full textYang, Min, Chao Chen, and Yang Liu, eds. Network and System Security. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-92708-0.
Full textLiu, Joseph K., and Xinyi Huang, eds. Network and System Security. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-36938-5.
Full textQiu, Meikang, Shouhuai Xu, Moti Yung, and Haibo Zhang, eds. Network and System Security. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-25645-0.
Full textYan, Zheng, Refik Molva, Wojciech Mazurczyk, and Raimo Kantola, eds. Network and System Security. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64701-2.
Full textChen, Jiageng, Vincenzo Piuri, Chunhua Su, and Moti Yung, eds. Network and System Security. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46298-1.
Full textKutyłowski, Mirosław, Jun Zhang, and Chao Chen, eds. Network and System Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-65745-1.
Full textXu, Li, Elisa Bertino, and Yi Mu, eds. Network and System Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34601-9.
Full textAu, Man Ho, Barbara Carminati, and C. C. Jay Kuo, eds. Network and System Security. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11698-3.
Full textBook chapters on the topic "System and network security"
Xu, Jianfeng, Fuhui Sun, and Qiwei Chen. "Network Security." In Introduction to the Smart Court System-of-Systems Engineering Project of China, 343–84. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-2382-1_7.
Full textRosenberg, Ishai, and Ehud Gudes. "Evading System-Calls Based Intrusion Detection Systems." In Network and System Security, 200–216. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46298-1_14.
Full textKluczniak, Kamil, Lucjan Hanzlik, Przemysław Kubiak, and Mirosław Kutyłowski. "Anonymous Evaluation System." In Network and System Security, 283–99. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-25645-0_19.
Full textZhang, Jian-feng, Fei Liu, Li-ming Zheng, Yan Jia, and Peng Zou. "Using Network Security Index System to Evaluate Network Security." In The 19th International Conference on Industrial Engineering and Engineering Management, 989–1000. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38433-2_104.
Full textLiu, Mengling, and Man Ho Au. "Practical Anonymous Multi-hop Locks for Lightning Network Compatible Payment Channel Networks." In Network and System Security, 547–60. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-23020-2_31.
Full textLi, Yunhao, Weichuan Mo, Cong Li, Haiyang Wang, Jianwei He, Shanshan Hao, and Hongyang Yan. "Network Intrusion Detection Adversarial Attacks for LEO Constellation Networks Based on Deep Learning." In Network and System Security, 51–65. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-23020-2_3.
Full textZhang, Jiayuan, Yao Yao, Xiaoqi Li, Jian Xie, and Gaofei Wu. "An Android Vulnerability Detection System." In Network and System Security, 169–83. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64701-2_13.
Full textLiang, Lulu, Kai Zheng, Qiankun Sheng, Wei Wang, Rong Fu, and Xin Huang. "A Denial of Service Attack Method for IoT System in Photovoltaic Energy System." In Network and System Security, 613–22. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64701-2_48.
Full textZhang, Li, Zhuo Lv, Xuesong Zhang, Cen Chen, Nuannuan Li, Yidong Li, and Wei Wang. "A Novel Approach for Traffic Anomaly Detection in Power Distributed Control System and Substation System." In Network and System Security, 408–17. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-36938-5_24.
Full textChow, Sherman S. M., Russell W. F. Lai, Xiuhua Wang, and Yongjun Zhao. "Privacy Preserving Credit Systems." In Network and System Security, 184–99. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46298-1_13.
Full textConference papers on the topic "System and network security"
Zhang, Jifang. "Design of Campus Network Security System Based on Network Information Security." In 2022 IEEE Asia-Pacific Conference on Image Processing, Electronics and Computers (IPEC). IEEE, 2022. http://dx.doi.org/10.1109/ipec54454.2022.9777499.
Full textRoth, Sebastian, Timothy Barron, Stefano Calzavara, Nick Nikiforakis, and Ben Stock. "Complex Security Policy? A Longitudinal Analysis of Deployed Content Security Policies." In Network and Distributed System Security Symposium. Reston, VA: Internet Society, 2020. http://dx.doi.org/10.14722/ndss.2020.23046.
Full textStevens, Rock, Josiah Dykstra, Wendy Knox Everette, James Chapman, Garrett Bladow, Alexander Farmer, Kevin Halliday, and Michelle L. Mazurek. "Compliance Cautions: Investigating Security Issues Associated with U.S. Digital-Security Standards." In Network and Distributed System Security Symposium. Reston, VA: Internet Society, 2020. http://dx.doi.org/10.14722/ndss.2020.24003.
Full textWei, Sixiao, Dan Shen, Linqiang Ge, Wei Yu, Erik P. Blasch, Khanh D. Pham, and Genshe Chen. "Secured network sensor-based defense system." In SPIE Defense + Security, edited by Khanh D. Pham and Genshe Chen. SPIE, 2015. http://dx.doi.org/10.1117/12.2179282.
Full textJi, Song, Ling Pang, and Wenying Xia. "Campus Network Security Analysis and Design of Security System." In 2015 International Conference on Computational Intelligence and Communication Networks (CICN). IEEE, 2015. http://dx.doi.org/10.1109/cicn.2015.209.
Full textHe, Qian. "Smart City Network Security Evaluation System." In 2021 International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS). IEEE, 2021. http://dx.doi.org/10.1109/icitbs53129.2021.00070.
Full textXiaobo Huang, Mingxue Zhang, and Xiaoyan Wang. "Protection system for network boundary security." In 2010 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT 2010). IEEE, 2010. http://dx.doi.org/10.1109/iccsit.2010.5564727.
Full textLee, Shinkyung, Namje Park, and Dooho Choi. "Security Management System for Sensor Network." In 2008 International Conference on Convergence and Hybrid Information Technology. IEEE, 2008. http://dx.doi.org/10.1109/ichit.2008.254.
Full textPedireddy, Taraka, and José M. Vidal. "A prototype multiAgent network security system." In the second international joint conference. New York, New York, USA: ACM Press, 2003. http://dx.doi.org/10.1145/860575.860812.
Full textXiaodong, Ding, Wang Quan, Yang Pengfei, Zhou Haijing, Huang Yuyan, Weng Haitao, and Pan Zhongbin. "Security System for Internal Network Printing." In 2012 Eighth International Conference on Computational Intelligence and Security (CIS). IEEE, 2012. http://dx.doi.org/10.1109/cis.2012.139.
Full textReports on the topic "System and network security"
Scarfone, Karen, and Victoria Thompson. System and network security acronyms and abbreviations. Gaithersburg, MD: National Institute of Standards and Technology, 2009. http://dx.doi.org/10.6028/nist.ir.7581.
Full textMittrick, Mark R. Network Basic Language Translation System: Security Infrastructure. Fort Belvoir, VA: Defense Technical Information Center, July 2007. http://dx.doi.org/10.21236/ada469904.
Full textDinkel, Charles. Secure data network system (SDNS) network, transport, and message security protocols. Gaithersburg, MD: National Institute of Standards and Technology, 1990. http://dx.doi.org/10.6028/nist.ir.90-4250.
Full textCapell, Peter. Analysis of Courses in Information Management and Network System Security & Survivability. Fort Belvoir, VA: Defense Technical Information Center, May 1999. http://dx.doi.org/10.21236/ada363791.
Full textHurd, Steven A., Jason Edwin Stamp, David P. Duggan, and Adrian R. Chavez. Applying New Network Security Technologies to SCADA Systems. Office of Scientific and Technical Information (OSTI), November 2006. http://dx.doi.org/10.2172/1137212.
Full textMiller, Craig, and Robert Larmouth. Energy Sector Security through a System for Intelligent, Learning Network Configuration Monitoring and Management (“Essence”). Office of Scientific and Technical Information (OSTI), May 2017. http://dx.doi.org/10.2172/1360111.
Full textSECRETARY OF THE AIR FORCE WASHINGTON DC. Communications and Information: Strategic Automated Command Control System-Data Transmission Subsystem (SACCS-DTS) Network Security Program. Volume 2. Fort Belvoir, VA: Defense Technical Information Center, November 1997. http://dx.doi.org/10.21236/ada405150.
Full textSECRETARY OF THE AIR FORCE WASHINGTON DC. Communications and Information: Strategic Automated Command Control System-Data Transmission Subsystem (SACCS-DTS) Network Security Plan. Volume 3. Fort Belvoir, VA: Defense Technical Information Center, June 1998. http://dx.doi.org/10.21236/ada405155.
Full textKwiat, Paul, Eric Chitambar, Andrew Conrad, and Samantha Isaac. Autonomous Vehicle-Based Quantum Communication Network. Illinois Center for Transportation, September 2022. http://dx.doi.org/10.36501/0197-9191/22-020.
Full textByer, David E. Utilizing Routine Water Quality Instruments and Artificial Neural Networks for Monitoring Distribution System Security. Fort Belvoir, VA: Defense Technical Information Center, May 2003. http://dx.doi.org/10.21236/ada414222.
Full text