Academic literature on the topic 'System and network security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'System and network security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "System and network security"

1

Zhou, Wanlei, and Yang Xiang. "Network and system security." Journal of Network and Computer Applications 32, no. 2 (March 2009): 345–46. http://dx.doi.org/10.1016/j.jnca.2008.06.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

He, Shen, Jing Huang, and Penglin Yang. "Build with intrinsic security: Trusted autonomy security system." International Journal of Distributed Sensor Networks 16, no. 11 (November 2020): 155014772097453. http://dx.doi.org/10.1177/1550147720974535.

Full text
Abstract:
Security of Internet of things network is difficult to manage because Internet of things devices are heterogeneous and always deployed in remote places. Based on these features, attacks against Internet of things network like distributed denial-of-service and system intrusion are easier than traditional network. In order to enhance Internet of things network’s security, in this article we propose the concept of intrinsic security to establish a trusted and autonomy Internet of things network. Intrinsic security emphasizes that network itself must be trusted and security autonomous to address the security problems which are caused by remote and heterogeneous. Based on this thought, we designed the architecture of Trusted Autonomy Security System. Trusted Autonomy Security System maintains a LAN characterized by trusted and security autonomy, in which all Internet of things network gateways formed a decentralized autonomy system to evaluate if other gateways or Internet of things devices are secure. Compared to traditional Internet of things networks, this architecture uses trusted computing technique to build the basic of security, and makes Internet of things network available to manage security automatically. In addition, the decentralized architecture could reduce security risks caused by compromise of single node in Internet of things network. With these advantages, it can be expected that this novel idea will have more development in Internet of things scenarios with high security requirements.
APA, Harvard, Vancouver, ISO, and other styles
3

Ganzhur, M. A., and A. I. Bryukhovetsky. "Network security systems." Herald of Dagestan State Technical University. Technical Sciences 49, no. 3 (November 8, 2022): 61–67. http://dx.doi.org/10.21822/2073-6185-2022-49-3-61-67.

Full text
Abstract:
Objective. Network security systems are one of the key players in today's business life. Some networks are private while others are open to the public. Whether your network is private or public, it must be well secured and secure. In this article, we will discuss where network security begins, and describe the general measures taken to secure it.Method. The study is determined by the need to solve the problem of algorithmic and mathematical support for assessing the functional security of a network based on system modeling and finding erroneous positions.Result. Proposed deployment of a private network system that is designed and serves a specific group of people for communication, collaboration and sharing.Conclusion. The proposed methods can be effective in protecting the network from attacks and other security threats. Well-designed corporate policies are critical to defining and controlling access to various parts of the network.
APA, Harvard, Vancouver, ISO, and other styles
4

Megat Mohamed Noor, Megat Norulazmi. "Community based home security system using wireless mesh network." International Journal of Academic Research 5, no. 5 (October 10, 2013): 73–79. http://dx.doi.org/10.7813/2075-4124.2013/5-5/a.9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kozlov, Dmitriy, and Natalia Sadovnikova. "Security System of POS-Network." NBI Technologies 14, no. 1 (September 2020): 6–10. http://dx.doi.org/10.15688/nbit.jvolsu.2020.1.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Adamczyk, Piotr, Grzegorz Kiryk, Jarosław Napiórkowski, and Andrzej Walczak. "Network model of security system." MATEC Web of Conferences 76 (2016): 02002. http://dx.doi.org/10.1051/matecconf/20167602002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

White, Gregory B., Eric A. Fisch, and Udo W. Pooch. "Computer System and Network Security." EDPACS 25, no. 8 (February 1998): 12–13. http://dx.doi.org/10.1201/1079/43236.25.8.19980201/30188.4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Röpke, Christian, and Thorsten Holz. "On network operating system security." International Journal of Network Management 26, no. 1 (November 11, 2015): 6–24. http://dx.doi.org/10.1002/nem.1918.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

McDonald, Kenneth, Joshua Akers, Forrest Bartz, Daniel Beck, Israel Castro, and LTC Robert Prins. "Food Security Network Modeling." Industrial and Systems Engineering Review 4, no. 2 (November 12, 2016): 114–30. http://dx.doi.org/10.37266/iser.2016v4i2.pp114-130.

Full text
Abstract:
Food security creates a complex issue for American interests. Within a constantly expanding operational environment, food security remains a vital lifeline both domestically and abroad. Current methods of mapping an area’s food system rely on ad-hoc assessments that produce skewed results and minimal metric analysis. Previous assessments methodologies failed to incorporate components of a food system that influences the overall stability of an area. The research conducted utilized the Systems Decision Process (SDP) to create a value hierarchy and model that provide an assessment for an areas food system. The findings from the research showcase that a food system relies on several variables such as infrastructure, dietary needs, and the national stability of a region. A more enhanced assessment model was developed that placed an overarching value to a food network that allows ground commanders to gain a holistic overview of the condition of an areas food system.
APA, Harvard, Vancouver, ISO, and other styles
10

B N, Mangalagowri, and Dr N. Sandeep Varma. "Intrusion Detection System of IPv6 Network." International Journal for Research in Applied Science and Engineering Technology 10, no. 9 (September 30, 2022): 1267–74. http://dx.doi.org/10.22214/ijraset.2022.46628.

Full text
Abstract:
Abstract: There are variations within the network of the differential computing system's underlying IPv6 network. There are different blind zones for security detection. It is thoroughly investigated how the automatic data processing system differs from the underlying IPv6 network. An enhanced underlying IPv6 network security detection module design approach is suggested for the multicomputer system based on this concept. One gets the comprehensive module design plan. The new technologies like receiving thread domain, object forwarding domain, and file buffer are taken into account by the network security detection system. It can alleviate the challenges with security detection brought on by IPv6 network variations in the underlying computing system. Thus, IPv6 networks have a significantly lower number of blind zones.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "System and network security"

1

Yucel, Okan. "Information System Security." Master's thesis, METU, 2003. http://etd.lib.metu.edu.tr/upload/4/1260303/index.pdf.

Full text
Abstract:
This thesis analyzes the physical, communicational, and organizational dimensions of information system security process by taking the four-layer approach, which is composed of the policy, model, architecture, and mechanisms into account. Within this scope, according to the results of the security analysis of information systems in METU Informatics Institute, the policy, model, architecture, and mechanisms necessary to prepare a new security process were proposed. As a subcomponent of this proposed security process, the network security of the IS100 course was partially established, and the generated results were evaluated.
APA, Harvard, Vancouver, ISO, and other styles
2

Mantere, M. (Matti). "Network security monitoring and anomaly detection in industrial control system networks." Doctoral thesis, Oulun yliopisto, 2015. http://urn.fi/urn:isbn:9789526208152.

Full text
Abstract:
Abstract Industrial control system (ICS) networks used to be isolated environments, typically separated by physical air gaps from the wider area networks. This situation has been changing and the change has brought with it new cybersecurity issues. The process has also exacerbated existing problems that were previously less exposed due to the systems’ relative isolation. This process of increasing connectivity between devices, systems and persons can be seen as part of a paradigm shift called the Internet of Things (IoT). This change is progressing and the industry actors need to take it into account when working to improve the cybersecurity of ICS environments and thus their reliability. Ensuring that proper security processes and mechanisms are being implemented and enforced on the ICS network level is an important part of the general security posture of any given industrial actor. Network security and the detection of intrusions and anomalies in the context of ICS networks are the main high-level research foci of this thesis. These issues are investigated through work on machine learning (ML) based anomaly detection (AD). Potentially suitable features, approaches and algorithms for implementing a network anomaly detection system for use in ICS environments are investigated. After investigating the challenges, different approaches and methods, a proof-ofconcept (PoC) was implemented. The PoC implementation is built on top of the Bro network security monitoring framework (Bro) for testing the selected approach and tools. In the PoC, a Self-Organizing Map (SOM) algorithm is implemented using Bro scripting language to demonstrate the feasibility of using Bro as a base system. The implemented approach also represents a minimal case of event-driven machine learning anomaly detection (EMLAD) concept conceived during the research. The contributions of this thesis are as follows: a set of potential features for use in machine learning anomaly detection, proof of the feasibility of the machine learning approach in ICS network setting, a concept for event-driven machine learning anomaly detection, a design and initial implementation of user configurable and extendable machine learning anomaly detection framework for ICS networks
Tiivistelmä Kehittyneet yhteiskunnat käyttävät teollisuuslaitoksissaan ja infrastruktuuriensa operoinnissa monimuotoisia automaatiojärjestelmiä. Näiden automaatiojärjestelmien tieto- ja kyberturvallisuuden tila on hyvin vaihtelevaa. Laitokset ja niiden hyödyntämät järjestelmät voivat edustaa usean eri aikakauden tekniikkaa ja sisältää useiden eri aikakauden heikkouksia ja haavoittuvaisuuksia. Järjestelmät olivat aiemmin suhteellisen eristyksissä muista tietoverkoista kuin omista kommunikaatioväylistään. Tämä automaatiojärjestelmien eristyneisyyden heikkeneminen on luonut uuden joukon uhkia paljastamalla niiden kommunikaatiorajapintoja ympäröivälle maailmalle. Nämä verkkoympäristöt ovat kuitenkin edelleen verrattaen eristyneitä ja tätä ominaisuutta voidaan hyödyntää niiden valvonnassa. Tässä työssä esitetään tutkimustuloksia näiden verkkojen turvallisuuden valvomisesta erityisesti poikkeamien havainnoinnilla käyttäen hyväksi koneoppimismenetelmiä. Alkuvaiheen haasteiden ja erityispiirteiden tutkimuksen jälkeen työssä käytetään itsejärjestyvien karttojen (Self-Organizing Map, SOM) algoritmia esimerkkiratkaisun toteutuksessa uuden konseptin havainnollistamiseksi. Tämä uusi konsepti on tapahtumapohjainen koneoppiva poikkeamien havainnointi (Event-Driven Machine Learning Anomaly Detection, EMLAD). Työn kontribuutiot ovat seuraavat, kaikki teollisuusautomaatioverkkojen kontekstissa: ehdotus yhdeksi anomalioiden havainnoinnissa käytettävien ominaisuuksien ryhmäksi, koneoppivan poikkeamien havainnoinnin käyttökelpoisuuden toteaminen, laajennettava ja joustava esimerkkitoteutus uudesta EMLAD-konseptista toteutettuna Bro NSM työkalun ohjelmointikielellä
APA, Harvard, Vancouver, ISO, and other styles
3

Coffey, Thomas. "A distributed global-wide security system." Thesis, University of Ulster, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.260989.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Scully, Michael N. B. "Network and system security in an information age." Honors in the Major Thesis, University of Central Florida, 2000. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/204.

Full text
Abstract:
This item is only available in print in the UCF Libraries. If this is your Honors Thesis, you can help us make it available online for use by researchers around the world by following the instructions on the distribution consent form at http://library.ucf.edu/Systems/DigitalInitiatives/DigitalCollections/InternetDistributionConsentAgreementForm.pdf You may also contact the project coordinator, Kerri Bottorff, at kerri.bottorff@ucf.edu for more information.
Bachelors
Business Administration
Management Information Systems
APA, Harvard, Vancouver, ISO, and other styles
5

Benbrook, Jimmie Glen 1943. "A SYSTEM ANALYSIS OF A MULTILEVEL SECURE LOCAL AREA NETWORK (COMPUTER)." Thesis, The University of Arizona, 1986. http://hdl.handle.net/10150/275531.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lessner, Dirk. "Network security for embedded systems /." [St. Lucia, Qld.], 2005. http://adt.library.uq.edu.au/public/adt-QU20060215.160952/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Burchett, Ian. "Quantifying Computer Network Security." TopSCHOLAR®, 2011. http://digitalcommons.wku.edu/theses/1118.

Full text
Abstract:
Simplifying network security data to the point that it is readily accessible and usable by a wider audience is increasingly becoming important, as networks become larger and security conditions and threats become more dynamic and complex, requiring a broader and more varied security staff makeup. With the need for a simple metric to quantify the security level on a network, this thesis proposes: simplify a network’s security risk level into a simple metric. Methods for this simplification of an entire network’s security level are conducted on several characteristic networks. Identification of computer network port vulnerabilities from NIST’s Network Vulnerability Database (NVD) are conducted, and via utilization of NVD’s Common Vulnerability Scoring System values, composite scores are created for each computer on the network, and then collectively a composite score is computed for the entire network, which accurately represents the health of the entire network. Special concerns about small numbers of highly vulnerable computers or especially critical members of the network are confronted.
APA, Harvard, Vancouver, ISO, and other styles
8

Song, Zixuan. "A Network based Home surveillance/ monitoring system : Router based Deployment and Network Security." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-47314.

Full text
Abstract:
Home surveillance/monitoring systems are widely used nowadays. An intelligent surveillance system can provide multiple functions for uses. The assumption underlying this thesis project is that a home surveillance system can help people manage their homes better. The thesis presents two investigations into an intelligent home surveillance system implementation. First we will focus on the development of a router platform, which can manage the cameras connected to an intelligent home surveillance system. Such a system will include at least one router, one or more cameras. Some of these cameras will be connected by wireless links. Each camera will be dynamically allocated an IP address. The system will manage and control the various elements of the home surveillance/monitoring system via the network. Second, we will examine potential network security solutions, and choose a suitable solution. A key result of this thesis project is that SRTP and MIKEY are suitable for use in a home surveillance/monitoring system and together they provide authentication and privacy for the information from the camera (and potentially other information). This privacy is an important aspect of a home surveillance/monitoring system, since improper use of this information could be damaging to the homeowner’s privacy and personal integrity.
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Haiyuan. "Security Architecture for the TEAMDEC System." Thesis, Virginia Tech, 1999. http://hdl.handle.net/10919/9778.

Full text
Abstract:
The prevalence of the Internet, client/server applications, Java, e-commerce, and electronic communications offers tremendous opportunities for business, education and communication, while simultaneously presenting big challenges to network security. In general, the web was designed with little concern for security. Thus, the issue of security is important in the design of network-based applications. The software architecture proposed in this thesis allows for the secure and efficient running of a team-based decision support system, specifically TEAMDEC. Based on the system's requirements and architecture, three types of possible attacks to the system are identified and a security solution is proposed that allows for user authentication, secure communication, and script access control. The implementation of these features will reduce security risk and allow effective use of the valuable system information data.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
10

Onder, Hulusi. "A Security Management System Design." Thesis, METU, 2007. http://etd.lib.metu.edu.tr/upload/12608515/index.pdf.

Full text
Abstract:
This thesis analyzes the difficulties of managing the security of an enterprise network. The problem that this thesis study deals with is the central management of a large number and variety of services that provide organization-wide network and information security. This study addresses two problem areas: how to better manage the security of a network, and how to explain the security issues to upper management better. The study proposes a Security Management System (SMS) to be used for network security management, monitoring and reporting purposes. The system is a custom made, central management solution, which combines the critical performance indicators of the security devices and presents the results via web pages.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "System and network security"

1

Vacca, John R. Network and system security. Burlington, MA: Syngress/Elsevier, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Network and system security. Burlington, MA: Syngress, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yang, Min, Chao Chen, and Yang Liu, eds. Network and System Security. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-92708-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Liu, Joseph K., and Xinyi Huang, eds. Network and System Security. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-36938-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Qiu, Meikang, Shouhuai Xu, Moti Yung, and Haibo Zhang, eds. Network and System Security. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-25645-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yan, Zheng, Refik Molva, Wojciech Mazurczyk, and Raimo Kantola, eds. Network and System Security. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64701-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chen, Jiageng, Vincenzo Piuri, Chunhua Su, and Moti Yung, eds. Network and System Security. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46298-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kutyłowski, Mirosław, Jun Zhang, and Chao Chen, eds. Network and System Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-65745-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Xu, Li, Elisa Bertino, and Yi Mu, eds. Network and System Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34601-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Au, Man Ho, Barbara Carminati, and C. C. Jay Kuo, eds. Network and System Security. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11698-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "System and network security"

1

Xu, Jianfeng, Fuhui Sun, and Qiwei Chen. "Network Security." In Introduction to the Smart Court System-of-Systems Engineering Project of China, 343–84. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-2382-1_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rosenberg, Ishai, and Ehud Gudes. "Evading System-Calls Based Intrusion Detection Systems." In Network and System Security, 200–216. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46298-1_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kluczniak, Kamil, Lucjan Hanzlik, Przemysław Kubiak, and Mirosław Kutyłowski. "Anonymous Evaluation System." In Network and System Security, 283–99. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-25645-0_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Jian-feng, Fei Liu, Li-ming Zheng, Yan Jia, and Peng Zou. "Using Network Security Index System to Evaluate Network Security." In The 19th International Conference on Industrial Engineering and Engineering Management, 989–1000. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38433-2_104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Mengling, and Man Ho Au. "Practical Anonymous Multi-hop Locks for Lightning Network Compatible Payment Channel Networks." In Network and System Security, 547–60. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-23020-2_31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Li, Yunhao, Weichuan Mo, Cong Li, Haiyang Wang, Jianwei He, Shanshan Hao, and Hongyang Yan. "Network Intrusion Detection Adversarial Attacks for LEO Constellation Networks Based on Deep Learning." In Network and System Security, 51–65. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-23020-2_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zhang, Jiayuan, Yao Yao, Xiaoqi Li, Jian Xie, and Gaofei Wu. "An Android Vulnerability Detection System." In Network and System Security, 169–83. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64701-2_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Liang, Lulu, Kai Zheng, Qiankun Sheng, Wei Wang, Rong Fu, and Xin Huang. "A Denial of Service Attack Method for IoT System in Photovoltaic Energy System." In Network and System Security, 613–22. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64701-2_48.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, Li, Zhuo Lv, Xuesong Zhang, Cen Chen, Nuannuan Li, Yidong Li, and Wei Wang. "A Novel Approach for Traffic Anomaly Detection in Power Distributed Control System and Substation System." In Network and System Security, 408–17. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-36938-5_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chow, Sherman S. M., Russell W. F. Lai, Xiuhua Wang, and Yongjun Zhao. "Privacy Preserving Credit Systems." In Network and System Security, 184–99. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46298-1_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "System and network security"

1

Zhang, Jifang. "Design of Campus Network Security System Based on Network Information Security." In 2022 IEEE Asia-Pacific Conference on Image Processing, Electronics and Computers (IPEC). IEEE, 2022. http://dx.doi.org/10.1109/ipec54454.2022.9777499.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Roth, Sebastian, Timothy Barron, Stefano Calzavara, Nick Nikiforakis, and Ben Stock. "Complex Security Policy? A Longitudinal Analysis of Deployed Content Security Policies." In Network and Distributed System Security Symposium. Reston, VA: Internet Society, 2020. http://dx.doi.org/10.14722/ndss.2020.23046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Stevens, Rock, Josiah Dykstra, Wendy Knox Everette, James Chapman, Garrett Bladow, Alexander Farmer, Kevin Halliday, and Michelle L. Mazurek. "Compliance Cautions: Investigating Security Issues Associated with U.S. Digital-Security Standards." In Network and Distributed System Security Symposium. Reston, VA: Internet Society, 2020. http://dx.doi.org/10.14722/ndss.2020.24003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wei, Sixiao, Dan Shen, Linqiang Ge, Wei Yu, Erik P. Blasch, Khanh D. Pham, and Genshe Chen. "Secured network sensor-based defense system." In SPIE Defense + Security, edited by Khanh D. Pham and Genshe Chen. SPIE, 2015. http://dx.doi.org/10.1117/12.2179282.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ji, Song, Ling Pang, and Wenying Xia. "Campus Network Security Analysis and Design of Security System." In 2015 International Conference on Computational Intelligence and Communication Networks (CICN). IEEE, 2015. http://dx.doi.org/10.1109/cicn.2015.209.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

He, Qian. "Smart City Network Security Evaluation System." In 2021 International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS). IEEE, 2021. http://dx.doi.org/10.1109/icitbs53129.2021.00070.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Xiaobo Huang, Mingxue Zhang, and Xiaoyan Wang. "Protection system for network boundary security." In 2010 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT 2010). IEEE, 2010. http://dx.doi.org/10.1109/iccsit.2010.5564727.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lee, Shinkyung, Namje Park, and Dooho Choi. "Security Management System for Sensor Network." In 2008 International Conference on Convergence and Hybrid Information Technology. IEEE, 2008. http://dx.doi.org/10.1109/ichit.2008.254.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Pedireddy, Taraka, and José M. Vidal. "A prototype multiAgent network security system." In the second international joint conference. New York, New York, USA: ACM Press, 2003. http://dx.doi.org/10.1145/860575.860812.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Xiaodong, Ding, Wang Quan, Yang Pengfei, Zhou Haijing, Huang Yuyan, Weng Haitao, and Pan Zhongbin. "Security System for Internal Network Printing." In 2012 Eighth International Conference on Computational Intelligence and Security (CIS). IEEE, 2012. http://dx.doi.org/10.1109/cis.2012.139.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "System and network security"

1

Scarfone, Karen, and Victoria Thompson. System and network security acronyms and abbreviations. Gaithersburg, MD: National Institute of Standards and Technology, 2009. http://dx.doi.org/10.6028/nist.ir.7581.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mittrick, Mark R. Network Basic Language Translation System: Security Infrastructure. Fort Belvoir, VA: Defense Technical Information Center, July 2007. http://dx.doi.org/10.21236/ada469904.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Dinkel, Charles. Secure data network system (SDNS) network, transport, and message security protocols. Gaithersburg, MD: National Institute of Standards and Technology, 1990. http://dx.doi.org/10.6028/nist.ir.90-4250.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Capell, Peter. Analysis of Courses in Information Management and Network System Security & Survivability. Fort Belvoir, VA: Defense Technical Information Center, May 1999. http://dx.doi.org/10.21236/ada363791.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hurd, Steven A., Jason Edwin Stamp, David P. Duggan, and Adrian R. Chavez. Applying New Network Security Technologies to SCADA Systems. Office of Scientific and Technical Information (OSTI), November 2006. http://dx.doi.org/10.2172/1137212.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Miller, Craig, and Robert Larmouth. Energy Sector Security through a System for Intelligent, Learning Network Configuration Monitoring and Management (“Essence”). Office of Scientific and Technical Information (OSTI), May 2017. http://dx.doi.org/10.2172/1360111.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

SECRETARY OF THE AIR FORCE WASHINGTON DC. Communications and Information: Strategic Automated Command Control System-Data Transmission Subsystem (SACCS-DTS) Network Security Program. Volume 2. Fort Belvoir, VA: Defense Technical Information Center, November 1997. http://dx.doi.org/10.21236/ada405150.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

SECRETARY OF THE AIR FORCE WASHINGTON DC. Communications and Information: Strategic Automated Command Control System-Data Transmission Subsystem (SACCS-DTS) Network Security Plan. Volume 3. Fort Belvoir, VA: Defense Technical Information Center, June 1998. http://dx.doi.org/10.21236/ada405155.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kwiat, Paul, Eric Chitambar, Andrew Conrad, and Samantha Isaac. Autonomous Vehicle-Based Quantum Communication Network. Illinois Center for Transportation, September 2022. http://dx.doi.org/10.36501/0197-9191/22-020.

Full text
Abstract:
Quantum communication was demonstrated using autonomous vehicle-to-vehicle (V2V), as well as autonomous vehicle-to-infrastructure (V2I). Supporting critical subsystems including compact size, weight, and power (SWaP) quantum sources; optical systems; and pointing, acquisition, and tracking (PAT) subsystems were designed, developed, and tested. Novel quantum algorithms were created and analyzed, including quantum position verification (QPV) for mobile autonomous vehicles. The results of this research effort can be leveraged in support of future cross-platform, mobile quantum communication networks that provide improved security, more accurate autonomous sensors, and connected quantum computing nodes for next-generation, smart-infrastructure systems.
APA, Harvard, Vancouver, ISO, and other styles
10

Byer, David E. Utilizing Routine Water Quality Instruments and Artificial Neural Networks for Monitoring Distribution System Security. Fort Belvoir, VA: Defense Technical Information Center, May 2003. http://dx.doi.org/10.21236/ada414222.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography