Добірка наукової літератури з теми "Security of information and communication systems"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Security of information and communication systems".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Security of information and communication systems"

1

Masadeh, Shadi R., Shadi Aljawarneh, Ashraf Odeh, and Abdullah Alhaj. "Secure Communication." International Journal of Information Security and Privacy 7, no. 4 (October 2013): 1–10. http://dx.doi.org/10.4018/ijisp.2013100101.

Повний текст джерела
Анотація:
The idea of e-Commerce is to take advantage of all the possibilities offered by information technology (such as digital communications, multimedia, internet, cell phones, teleconferences, etc.) and to improve the security of various organizations. In the article, the authors focus on securing all the contents of e-Commerce by proposing a public key watermarking algorithm for web content integrity verification. The main purpose of this article is to present a new security system that enables e-Commerce to exchange data more securely and by altering the file content structure, detecting illegal access and stopping the illegal operation. Such system combines the watermarking techniques with the cryptography methods in order to provide the highest visible security component that influences on the end user through its daily payment interaction with business.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Matrokhina, K. V., A. B. Makhovikov, and E. N. Trofimets. "Ensuring information security in corporate communication systems." E3S Web of Conferences 266 (2021): 09001. http://dx.doi.org/10.1051/e3sconf/202126609001.

Повний текст джерела
Анотація:
The paper considers a secure information transfer protocol for corporate IP-telephony system. In the article are analized the advantages and disadvantages of the known protocols. A description of the process of establishing a connection, sending text messages and voice communication in the developed protocol is given. Its practical significance and expediency of use are described.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

WITKOWSKI, Marek. "SECURITY OF ICT SYSTEMS IN CRISIS MANAGEMENT." Scientific Journal of the Military University of Land Forces 162, no. 4 (October 1, 2011): 80–90. http://dx.doi.org/10.5604/01.3001.0002.3179.

Повний текст джерела
Анотація:
The article presents ICT (Information and Communication Technology) networks and systems that are used to provide communications for crisis management purposes. The articles describes wired and wireless communication assets and discusses their advantages and disadvantages when they are used to carry out national security tasks.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Gorbenko, I. D., and Yu V. Stasev. "Information security in space communication and control systems." Kosmìčna nauka ì tehnologìâ 2, no. 5-6 (September 30, 1996): 64–68. http://dx.doi.org/10.15407/knit1996.05.064.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Rao, Nandan, Shubhra Srivastava, and Sreekanth K.S. "PKI Deployment Challenges and Recommendations for ICS Networks." International Journal of Information Security and Privacy 11, no. 2 (April 2017): 38–48. http://dx.doi.org/10.4018/ijisp.2017040104.

Повний текст джерела
Анотація:
Different types of Control Systems used for Industrial production are broadly called Industrial Control Systems (ICS) (n.d.). These include Supervisory Control and Data Acquisition (SCADA) Systems and Distributed Control Systems (DCS). ICS typically perform the “Command and Control” operations required for smooth functioning of machines in industrial production. They are widely used in Critical infrastructures such as power generation and distribution systems, Oil and Gas plants, Chemical factories and various other manufacturing facilities. Traditionally, ICS used proprietary protocols and operated in isolation. Perimeter security was considered enough as the only means to compromise these systems was via physical access to the systems. However, increased standardization, open architecture adoption and connectivity to enterprise networks as well as internet opened up these systems for a wide range of audience and enabled remote attacks. In this new operation landscape, it is imperative that newer means of securing the networks are adopted continuously. One of the security considerations for the ICS networks is the communication paths used by these networks. Public Key Infrastructure (PKI) (n.d.) plays a key role in securing the communication of ICS networks. Using Digital Certificates, PKI provides a mechanism to verify the identity of all the entities on a network and also ensures that the information is shared securely between communicating entities. PKI is a proven mechanism for secure communication and is widely used in many organizations. However, PKI as a solution to ICS security is challenging due to factors such as resource constrained environments, bandwidth considerations and hard real-time communication requirements. This paper intends to focus on key challenges in Digital Certificate management and correct deployment of PKI in ICS networks and will also present recommendations to overcome these challenges without compromising the basic functionalities of ICS.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Leines-Vite, Lenin, Juan Carlos Pérez-Arriaga, and Xavier Limón. "Information and Communication Security Mechanisms For Microservices-based Systems." International Journal of Network Security & Its Applications 13, no. 6 (November 30, 2021): 85–103. http://dx.doi.org/10.5121/ijnsa.2021.13607.

Повний текст джерела
Анотація:
Security has become paramount in modern software services as more and more security breaches emerge, impacting final users and organizations alike. Trends like the Microservice Architecture bring new security challenges related to communication, system design, development, and operation. The literature presents a plethora of security-related solutions for microservices-based systems, but the spread of information difficult practitioners' adoption of novel security related solutions. In this study, we aim to present a catalogue and discussion of security solutions based on algorithms, protocols, standards, or implementations; supporting principles or characteristics of information security, considering the three possible states of data, according to the McCumber Cube. Our research follows a Systematic Literature Review, synthesizing the results with a meta-aggregation process. We identified a total of 30 primary studies, yielding 75 security solutions for the communication of microservices.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Koskosas, Ioannis. "Communicating information systems goals: A case in internet banking security." Computer Science and Information Systems 6, no. 1 (2009): 71–92. http://dx.doi.org/10.2298/csis0901071k.

Повний текст джерела
Анотація:
A large part of information systems (IS) security approaches is technical in nature with less consideration on people and organizational issues. The research presented in this paper adopts a broader perspective and presents an understanding of IS security in terms of a social and organizational perspective. In doing so, it uses the communication of risk messages among the members of IT groups in setting Internet banking goals in order to identify any weaknesses in security management procedures. The novel approach of this investigation is that explores and presents the issues of risk communication and goal setting in Internet banking security through indepth interviews within three case studies. That said, it promotes an interdisciplinary and inter-organizational theory which fosters a new dialog that transcends security industry specific contexts as opposed to other studies. Interview results suggest how an effective setting of Internet banking security goals can be achieved through specific considerations for improving the communication of security messages. The research contributes to interpretive information systems with the study of risk communication and goal setting in an Internet banking security context.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Stanton, Jeffrey M. "Security of Information and Communication Networks." Journal of the American Society for Information Science and Technology 61, no. 5 (November 11, 2009): 1074. http://dx.doi.org/10.1002/asi.21258.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Halaweh, Mohanad. "Users' Perception of Security for Mobile Communication Technology." International Journal of Information Security and Privacy 8, no. 3 (July 2014): 1–12. http://dx.doi.org/10.4018/ijisp.2014070101.

Повний текст джерела
Анотація:
Security perception has been investigated by much research within the e-commerce and e-banking context. However, very little research has investigated this issue within the general mobile context without limiting this to particular applications such as payment, marketing, banking and commerce. Therefore, this paper aims to explore the users' perception of security towards mobile phones from a wide perspective. An interpretive-qualitative research was adopted to investigate the users' perceptions. The research results provided evidence for extending the meaning of the security perception concept to include human security as a relevant issue to mobile phone usage. It also showed that mobile phones can be used as an instrument to commit fraud and crimes. Furthermore, the results showed that the development of mobile technology raises new security and privacy concerns. For practical implications, this research provides recommendations for mobile technology designers to improve mobile usability- related issues in order to improve users' feeling of security
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Menkus, Belden. "Information Systems Quality Assurance Enhances Information Systems Security." EDPACS 17, no. 12 (June 1990): 6–10. http://dx.doi.org/10.1080/07366989009450603.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Дисертації з теми "Security of information and communication systems"

1

Sarkar, Md Zahurul Islam. "Information-theoretic security in wireless communication systems." Thesis, Queen's University Belfast, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.579767.

Повний текст джерела
Анотація:
The security in wireless communication networks is an important issue due to the mobility of users and network components, and the fact that the wireless medium is susceptible to eavesdropping and fraud. Motivated by the importance of security in the wireless communication networks, we study the secrecy capacity and secure outage performance of wireless channels in the presence of single as well as multiple eavesdroppers. At first, we study the effect of fading on the secrecy capacity and see, how we can achieve high data rates with reliability in spite of harsh wireless channel subject to the fading. Then, we study the effect of correlation on the secrecy capacity and quantify the loss of secrecy capacity of fading channels due to correlation. Since, the diversity is traditionally exploited to combat the fading in wireless systems. Therefore; secondly, we study the effect of channel diversity on the secrecy capacity of fading channels. This study is also useful to see, how we can overcome the loss of secrecy capacity due to correlation and obtain the target secrecy rate by improving the capacity of main channel exploiting diversity combining. We also investigate the effect of spatial multiplexing on the secrecy capacity and secure outage performance of keyhole multiple-input multiple-output (MIMO) channel. In addition, an achievable secrecy capacity region is developed using secret dirty-paper coding (SDPC) scheme to study the effect of transmit diversity on the secrecy capacity. Since, the group-oriented applications often require same data to be conveyed to multiple users simultaneously, and the traditional multicasting does not provide a secure framework for authentication and privacy for multicast sessions, the lack of which is currently preventing the large-scale deployment of group-oriented applications. Therefore, finally we study secure wireless multicasting and investigate the effect of fading and channel diversity on the secrecy multicast capacity.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Ge, Renwei. "Information security in mobile ad hoc networks." Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file 1.57 Mb., 158 p, 2006. http://wwwlib.umi.com/dissertations/fullcit?3220810.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Campbell, Joshua Michael. "How Information and Communication Security Technologies Affect State Power." Malone University Undergraduate Honors Program / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=ma1462540876.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Goméz, Villanueva Daniel. "Secure E-mail System for Cloud Portals : Master Thesis in Information and Communication Systems Security." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-108080.

Повний текст джерела
Анотація:
Email is a well established technology used worldwide for enterprise and private communication through the Internet. It allows people to communicate using text, but also other information formats used either as HTML or attached files. The communication is performed without the need of synchronized endpoints, based on the use of email servers that take care of storing and forwarding email letters. All these properties and much more standardized ones do not include security, which makes the choice of service provider hard when the letters sent in the email system include sensitive information. In the last few years there has been a big interest and growth in the area of cloud computing. Placing resources (computers, applications, information) out of local environments, thanks to the high speed connections in the Internet, provides countless possibilities. Actually, even email systems can be deployed in cloud computing environments, including all the email services (interface, client, and server) or a part of them. From a security point of view, the use of cloud computing leads to many threats generated by external parties and even the cloud providers. Because of these reasons, this work intends to present an innovative approach to security in a cloud environment, focusing on the security of an email system. The purpose is to find a solution for an email system deployable in a cloud environment, with all the functionality deployed on a external machine. This email system must be completely protected, minimizing the actions taken by the user, which should just connect to a portal through a web browser. Along this report there are details about the foundations, progress and findings of the research that has been carried out. The main objectives involve: researching on the concepts and state of the art of cloud computing, email systems and security; presenting a cloud computing architecture that will take care of the general aspects of security; designing an email system for that architecture that contains mechanisms protecting it from the possible security threats; and finally, implementing a simplified version of the design to test and prove the feasibility of it. After all the mentioned activities, the findings are commented, mentioning the applicability of research results to the current situation. Obviously, there is place for more research in depth of several topics related to cloud computing and email, that is why some of them are suggested.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Koller, Thomas [Verfasser]. "Communication Security for Distributed Mixed-Criticality Systems / Thomas Koller." Aachen : Shaker, 2018. http://d-nb.info/1149615877/34.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Mahmood, Ashrafullah Khalid. "Information Security Management of Healthcare System." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4353.

Повний текст джерела
Анотація:
Information security has significant role in Healthcare organizations. The Electronic Health Record (EHR) with patient’s information is considered as very sensitive in Healthcare organization. Sensitive information of patients in healthcare has to be managed such that it is safe and secure from unauthorized access. The high-level quality care to patients is possible if healthcare management system is able to provide right information in right time to right place. Availability and accessibility are significant aspects of information security, where applicable information needs to be available and accessible for user within the healthcare organization as well as across organizational borders. At the same time, it is essentials to protect the patient security from unauthorized access and maintain the appropriate level in health care regarding information security. The aim of this thesis is to explore current management of information security in terms of Electronic Health Records (EHR) and how these are protected from possible security threats and risks in healthcare, when the sensitive information has to be communicated among different actors in healthcare as well as across borders. The Blekinge health care system was investigated through case study with conduction of several interviews to discover possible issues, concerning security threats to management of healthcare. The theoretical work was the framework and support for possible solutions of identified security risks and threats in Blekinge healthcare. At the end after mapping, the whole process possible guidelines and suggestions were recommended for healthcare in order to prevent the sensitive information from unauthorized access and maintain information security. The management of technical and administrative bodies was explored for security problems. It has main role to healthcare and in general, whole business is the responsibility of this management to manage the sensitive information of patients. Consequently, Blekinge healthcare was investigated for possible issues and some possible guidelines and suggestions in order to improve the current information security with prevention of necessary risks to healthcare sensitive information.
muqadas@gmail.com
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Nilsson, Håkan. "Reliable Communication of Time- and Security-Sensitive Information over a Single Combat Vehicle Network." Thesis, Linköpings universitet, Kommunikationssystem, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-162444.

Повний текст джерела
Анотація:
A common trend, in general as well as in the field of combat vehicles, is the rapidly increasing demand for data network capacity and even more in transferred data. To handle this increased demand, different countries with their armed forces and equipment manufacturers evaluate methods to increase the data transmission capacity in combat vehicles. The different types of transmitted data are of different criticality and have different security demands. An easy solution to this is to have separated networks for each type of traffic, but that is quite expensive and uses a lot of hardware. This thesis focuses on a different solution, with a shared network for all types of data transmissions. This is done by evaluating different types of data networks and add-on protocols and then testing the networks practically with varying transmission rates. In the thesis, all the practical testing is done with data networks according to the Ethernet standard, which is the standard evaluated with a throughput that is high enough for the use case. Ethernet as a standard is not suitable for critical data traffic and therefore add-on protocols for Ethernet to optimize the system for critical data traffic are tested. With these optimizations made, Ethernet can be considered more suitable for critical traffic, but this depends entirely on the system requirements.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Nguyen, Huy Manh. "MABIC: Mobile Application Builder for Interactive Communication." TopSCHOLAR®, 2016. http://digitalcommons.wku.edu/theses/1747.

Повний текст джерела
Анотація:
Nowadays, the web services and mobile technology advance to a whole new level. These technologies make the modern communication faster and more convenient than the traditional way. People can also easily share data, picture, image and video instantly. It also saves time and money. For example: sending an email or text message is cheaper and faster than a letter. Interactive communication allows the instant exchange of feedback and enables two-way communication between people and people, or people and computer. It increases the engagement of sender and receiver in communication. Although many systems such as REDCap and Taverna are built for improving the interactive communication between the servers and clients, there are still common drawbacks existing in these systems. These systems lack the support of the branching logic and two-way communication. They also require administrator’s programming skills to function the system adequately. These issues are the motivation of the project. The goal is to build a framework to speed up the prototype development of mobile application. The MABIC support the complex workflow by providing conditional logic, instantaneous interactivity between the administrators and participants and the mobility. These supported features of MABIC improve the interaction because it engages the participants to communicate more with the system. MABIC system provides the mobile electronic communication via sending a text message or pushing a notification to mobile’s device. Moreover, MABIC application also supports multiple mobile platforms. It helps to reduce the time and cost of development. In this thesis, the overview of MABIC system, its implementation, and related application is described.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Albehadili, Abdulsahib. "Link-signature in Physical Layer Security and Its Applications for PHY-key Generation, PHY-authentication, and Discriminatory Channel Estimation." University of Toledo / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1588784882183339.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Chinnam, S. "MULTI-WAY COMMUNICATION SYSTEM." CSUSB ScholarWorks, 2017. https://scholarworks.lib.csusb.edu/etd/443.

Повний текст джерела
Анотація:
Videoconferencing is increasingly becoming a trend worldwide in applications where clients need to access lectures, meeting proceedings, communicating with family and friends etc. It provides a platform enabling the visual, audio and video communication between clients. The aim of this project is to utilize the open source Java software to build a desktop application enabling communication between clients. When a user needs to transfer a secured file, it’s unsafe to send it using social networking sites because of lack of security. So, with the “Multi-Way Communication System” (MWCS) we resolve some security issues. The MWCS is a highly secure way for file transfer, text and video conferencing.
Стилі APA, Harvard, Vancouver, ISO та ін.

Книги з теми "Security of information and communication systems"

1

Belkasmi, Mostafa, Jalel Ben-Othman, Cheng Li, and Mohamed Essaaidi, eds. Advanced Communication Systems and Information Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61143-9.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Schmidt, Andreas U., Giovanni Russello, Antonio Lioy, Neeli R. Prasad, and Shiguo Lian, eds. Security and Privacy in Mobile Information and Communication Systems. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-17502-2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Schmidt, Andreas U., and Shiguo Lian, eds. Security and Privacy in Mobile Information and Communication Systems. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04434-2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Prasad, Ramjee, Károly Farkas, Andreas U. Schmidt, Antonio Lioy, Giovanni Russello, and Flaminia L. Luccio, eds. Security and Privacy in Mobile Information and Communication Systems. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30244-2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Schmidt, Andreas U., Giovanni Russello, Ioannis Krontiris, and Shiguo Lian, eds. Security and Privacy in Mobile Information and Communication Systems. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33392-7.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Jerman-Blažič, Borka. Advanced Communications and Multimedia Security: IFIP TC6. Boston, MA: Springer US, 2002.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Introduction to communication electronic warfare systems. 2nd ed. Boston: Artech House, 2008.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Victoria. Office of the Auditor-General. WoVG information security management framework. Melbourne, Vic: Victorian Government Printer, 2013.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Harkins, Malcolm. Managing Risk and Information Security: Protect to Enable. Berkeley, CA: Apress, 2013.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

P, Shim J., and SpringerLink (Online service), eds. Wireless Technology: Applications, Management, and Security. Boston, MA: Springer-Verlag US, 2009.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "Security of information and communication systems"

1

Jajodia, Sushil. "Protecting Critical Information Systems." In Information and Communication Security, 143. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/978-3-540-47942-0_12.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Karyda, Maria, Spyros Kokolakis, and Evangelos Kiountouzis. "Redefining Information Systems Security: Viable Information Systems." In IFIP Advances in Information and Communication Technology, 453–67. Boston, MA: Springer US, 2001. http://dx.doi.org/10.1007/0-306-46998-7_31.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Kesdogan, Dogan, Hannes Federrath, Anja Jerichow, and Andreas Pfitzmann. "Location Management Strategies Increasing Privacy in Mobile Communication." In Information Systems Security, 39–48. Boston, MA: Springer US, 1996. http://dx.doi.org/10.1007/978-1-5041-2919-0_4.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Marsalek, Alexander, Bernd Prünster, Bojan Suzic, and Thomas Zefferer. "SeDiCom: A Secure Distributed Privacy-Preserving Communication Platform." In Information Systems Security, 345–63. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-05171-6_18.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Veeningen, Meilof, Benne de Weger, and Nicola Zannone. "Formal Privacy Analysis of Communication Protocols for Identity Management." In Information Systems Security, 235–49. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25560-1_16.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Bag, Samiran, Sushmita Ruj, and Bimal Roy. "Jamming Resistant Schemes for Wireless Communication: A Combinatorial Approach." In Information Systems Security, 43–62. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-45204-8_4.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Hutchison, Andrew C. M., and Kurt Bauknecht. "Cryptographic key distribution and authentication protocols for secure group communication." In Information Systems Security, 492–93. Boston, MA: Springer US, 1996. http://dx.doi.org/10.1007/978-1-5041-2919-0_46.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Bhattacharya, Anup Kumar, Abhijit Das, Dipanwita Roychoudhury, Aravind Iyer, and Debojyoti Bhattacharya. "Autonomous Certification with List-Based Revocation for Secure V2V Communication." In Information Systems Security, 208–22. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35130-3_15.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Weik, Martin H. "information systems security." In Computer Science and Communications Dictionary, 779. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_8970.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Burghouwt, Pieter, Marcel Spruit, and Henk Sips. "Towards Detection of Botnet Communication through Social Media by Monitoring User Activity." In Information Systems Security, 131–43. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25560-1_9.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Security of information and communication systems"

1

Blasch, Erik P., and Andrew Hoff. "Intelligent communication systems sensor scheduling based on network information." In Defense and Security, edited by Kevin L. Priddy. SPIE, 2004. http://dx.doi.org/10.1117/12.548124.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Akopian, David, Philip Chen, Susheel Miryakar, and Abhinav Kumar. "Fast massive preventive security and information communication systems." In SPIE Defense and Security Symposium, edited by Sos S. Agaian and Sabah A. Jassim. SPIE, 2008. http://dx.doi.org/10.1117/12.777824.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Skaves, Peter. "FAA Aircraft Systems Information Security Protection overview." In 2015 Integrated Communication, Navigation, and Surveillance Conference (ICNS). IEEE, 2015. http://dx.doi.org/10.1109/icnsurv.2015.7121212.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Ruhil, Neelam, Jitender Kumar, and Rajesh Kumar. "Information security: In android expedients." In The International Conference on Communication and Computing Systems (ICCCS-2016). Taylor & Francis Group, 6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL 33487-2742: CRC Press, 2016. http://dx.doi.org/10.1201/9781315364094-100.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Alohali, Manal, Nathan Clarke, and Steven Furnell. "Information Security Risk Communication: A User-Centric Approach." In 2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA). IEEE, 2019. http://dx.doi.org/10.1109/aiccsa47632.2019.9035361.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Liu, Xinlin, and Wei Liu. "Information Security Encryption Method for Intelligent Communication Terminal." In ICISCAE 2021: 2021 IEEE 4th International Conference on Information Systems and Computer Aided Education. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3482632.3487531.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

"Workshop on future information security 2015." In 2015 7th International Conference on Communication Systems and Networks (COMSNETS). IEEE, 2015. http://dx.doi.org/10.1109/comsnets.2015.7098646.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Zhang, Wei, and Thelma Palaoag. "Improving Information Security in Smart City." In 2021 5th International Conference on Communication and Information Systems (ICCIS). IEEE, 2021. http://dx.doi.org/10.1109/iccis53528.2021.9645934.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Misra, Manoj Kumar, Rashi Mathur, and Rishish Tripathi. "On Post Quantum Wireless Communication Security." In 2021 5th International Conference on Information Systems and Computer Networks (ISCON). IEEE, 2021. http://dx.doi.org/10.1109/iscon52037.2021.9702489.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Cao, Zhen, Hui Deng, Lu Lu, and Xiaodong Duan. "An information-theoretic security metric for future wireless communication systems." In 2014 XXXIth URSI General Assembly and Scientific Symposium (URSI GASS). IEEE, 2014. http://dx.doi.org/10.1109/ursigass.2014.6929296.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Звіти організацій з теми "Security of information and communication systems"

1

Cuff, Paul. Provable Security of Communication for Protecting Information Flow in Distributed Systems. Fort Belvoir, VA: Defense Technical Information Center, June 2015. http://dx.doi.org/10.21236/ada620103.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Bohl, Dwight. Communications and Information. Communications Security: Protected Distribution Systems (PDS). Fort Belvoir, VA: Defense Technical Information Center, December 2000. http://dx.doi.org/10.21236/ada404837.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Perdigão, Rui A. P. Information physics and quantum space technologies for natural hazard sensing, modelling and prediction. Meteoceanics, September 2021. http://dx.doi.org/10.46337/210930.

Повний текст джерела
Анотація:
Disruptive socio-natural transformations and climatic change, where system invariants and symmetries break down, defy the traditional complexity paradigms such as machine learning and artificial intelligence. In order to overcome this, we introduced non-ergodic Information Physics, bringing physical meaning to inferential metrics, and a coevolving flexibility to the metrics of information transfer, resulting in new methods for causal discovery and attribution. With this in hand, we develop novel dynamic models and analysis algorithms natively built for quantum information technological platforms, expediting complex system computations and rigour. Moreover, we introduce novel quantum sensing technologies in our Meteoceanics satellite constellation, providing unprecedented spatiotemporal coverage, resolution and lead, whilst using exclusively sustainable materials and processes across the value chain. Our technologies bring out novel information physical fingerprints of extreme events, with recently proven records in capturing early warning signs for extreme hydro-meteorologic events and seismic events, and do so with unprecedented quantum-grade resolution, robustness, security, speed and fidelity in sensing, processing and communication. Our advances, from Earth to Space, further provide crucial predictive edge and added value to early warning systems of natural hazards and long-term predictions supporting climatic security and action.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Braslavskaya, Elena, and Tatyana Pavlova. English for IT-Specialists. SIB-Expertise, June 2021. http://dx.doi.org/10.12731/er0464.21062021.

Повний текст джерела
Анотація:
The course is designed in the e-learning environment LMS MOODLE AND INTENDED FOR REMOTE SUPPORT of the 2d-year students' INDEPENDENT WORK IN THE DISCIPLINE «ENGLISH language» of the institute of radio electronics and information security and the Institute of Information Technology and Management in technical systems in Sevsu. The aim of the course is the bachelor training, who can speak foreign language in various situations of interpersonal and professional communication at the level of at least B1+ according to the international scale EVALUATION; IMPROVING THE INITIAL FOREIGN LANGUAGE level reached at previous levels of education; mastering of the necessary and sufficient level of competence FOR SOLVING SOCIO-COMMUNICATIVE TASKS IN VARIOUS spheres OF PROFESSIONAL AND SCIENTIFIC ACTIVITIES WHEN COMMUNICATING WITH FOREIGN PARTNERS; FURTHER SELF-EDUCATION.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Kucherova, Hanna, Anastasiia Didenko, Olena Kravets, Yuliia Honcharenko, and Aleksandr Uchitel. Scenario forecasting information transparency of subjects' under uncertainty and development of the knowledge economy. [б. в.], October 2020. http://dx.doi.org/10.31812/123456789/4469.

Повний текст джерела
Анотація:
Topicality of modeling information transparency is determined by the influence it has on the effectiveness of management decisions made by an economic entity in the context of uncertainty and information asymmetry. It has been found that information transparency is a poorly structured category which acts as a qualitative characteristic of information and at certain levels forms an additional spectrum of properties of the information that has been adequately perceived or processed. As a result of structuring knowledge about the factor environment, a fuzzy cognitive model of information transparency was constructed in the form of a weighted digraph. Structural analysis and scenario forecasting of optimal alternatives of the fuzzy cognitive model made it possible to evaluate the classes of factors, identify their limited relations, establish the centrality of the roles of information transparency and information and communication security in the system built and evaluate their importance when modeling the situation self-development. Information visibility, reliability and availability have been found to have the strongest impact on the system. Taking into account different initial weights of the key factors — information transparency and information and communication security — the study substantiates the strategic ways for economic entities to achieve their goals in the context of uncertainty and information asymmetry, which allows us to use this approach as a tool for strategic management in the information environment.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Grance, T., J. Hash, S. Peck, J. Smith, and K. Korow-Diks. Security guide for interconnecting information technology systems. Gaithersburg, MD: National Institute of Standards and Technology, 2002. http://dx.doi.org/10.6028/nist.sp.800-47.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Swanson, M., N. Bartol, J. Sabato, J. Hash, and L. Graffo. Security metrics guide for information technology systems. Gaithersburg, MD: National Institute of Standards and Technology, 2003. http://dx.doi.org/10.6028/nist.sp.800-55.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Yeo, Tat S., and Xudong Chen. Establishing Information Security Systems via Optical Imaging. Fort Belvoir, VA: Defense Technical Information Center, August 2015. http://dx.doi.org/10.21236/ada623481.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Dempsey, K. L., N. S. Chawla, L. A. Johnson, R. Johnston, A. C. Jones, A. D. Orebaugh, M. A. Scholl, and K. M. Stine. Information Security Continuous Monitoring (ISCM) for federal information systems and organizations. Gaithersburg, MD: National Institute of Standards and Technology, 2011. http://dx.doi.org/10.6028/nist.sp.800-137.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Swanson, Marianne. Security self-assessment guide for information technology systems. Gaithersburg, MD: National Institute of Standards and Technology, 2001. http://dx.doi.org/10.6028/nist.sp.800-26.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії