Добірка наукової літератури з теми "Security of information and communication systems"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Security of information and communication systems".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Security of information and communication systems"
Masadeh, Shadi R., Shadi Aljawarneh, Ashraf Odeh, and Abdullah Alhaj. "Secure Communication." International Journal of Information Security and Privacy 7, no. 4 (October 2013): 1–10. http://dx.doi.org/10.4018/ijisp.2013100101.
Повний текст джерелаMatrokhina, K. V., A. B. Makhovikov, and E. N. Trofimets. "Ensuring information security in corporate communication systems." E3S Web of Conferences 266 (2021): 09001. http://dx.doi.org/10.1051/e3sconf/202126609001.
Повний текст джерелаWITKOWSKI, Marek. "SECURITY OF ICT SYSTEMS IN CRISIS MANAGEMENT." Scientific Journal of the Military University of Land Forces 162, no. 4 (October 1, 2011): 80–90. http://dx.doi.org/10.5604/01.3001.0002.3179.
Повний текст джерелаGorbenko, I. D., and Yu V. Stasev. "Information security in space communication and control systems." Kosmìčna nauka ì tehnologìâ 2, no. 5-6 (September 30, 1996): 64–68. http://dx.doi.org/10.15407/knit1996.05.064.
Повний текст джерелаRao, Nandan, Shubhra Srivastava, and Sreekanth K.S. "PKI Deployment Challenges and Recommendations for ICS Networks." International Journal of Information Security and Privacy 11, no. 2 (April 2017): 38–48. http://dx.doi.org/10.4018/ijisp.2017040104.
Повний текст джерелаLeines-Vite, Lenin, Juan Carlos Pérez-Arriaga, and Xavier Limón. "Information and Communication Security Mechanisms For Microservices-based Systems." International Journal of Network Security & Its Applications 13, no. 6 (November 30, 2021): 85–103. http://dx.doi.org/10.5121/ijnsa.2021.13607.
Повний текст джерелаKoskosas, Ioannis. "Communicating information systems goals: A case in internet banking security." Computer Science and Information Systems 6, no. 1 (2009): 71–92. http://dx.doi.org/10.2298/csis0901071k.
Повний текст джерелаStanton, Jeffrey M. "Security of Information and Communication Networks." Journal of the American Society for Information Science and Technology 61, no. 5 (November 11, 2009): 1074. http://dx.doi.org/10.1002/asi.21258.
Повний текст джерелаHalaweh, Mohanad. "Users' Perception of Security for Mobile Communication Technology." International Journal of Information Security and Privacy 8, no. 3 (July 2014): 1–12. http://dx.doi.org/10.4018/ijisp.2014070101.
Повний текст джерелаMenkus, Belden. "Information Systems Quality Assurance Enhances Information Systems Security." EDPACS 17, no. 12 (June 1990): 6–10. http://dx.doi.org/10.1080/07366989009450603.
Повний текст джерелаДисертації з теми "Security of information and communication systems"
Sarkar, Md Zahurul Islam. "Information-theoretic security in wireless communication systems." Thesis, Queen's University Belfast, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.579767.
Повний текст джерелаGe, Renwei. "Information security in mobile ad hoc networks." Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file 1.57 Mb., 158 p, 2006. http://wwwlib.umi.com/dissertations/fullcit?3220810.
Повний текст джерелаCampbell, Joshua Michael. "How Information and Communication Security Technologies Affect State Power." Malone University Undergraduate Honors Program / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=ma1462540876.
Повний текст джерелаGoméz, Villanueva Daniel. "Secure E-mail System for Cloud Portals : Master Thesis in Information and Communication Systems Security." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-108080.
Повний текст джерелаKoller, Thomas [Verfasser]. "Communication Security for Distributed Mixed-Criticality Systems / Thomas Koller." Aachen : Shaker, 2018. http://d-nb.info/1149615877/34.
Повний текст джерелаMahmood, Ashrafullah Khalid. "Information Security Management of Healthcare System." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4353.
Повний текст джерелаmuqadas@gmail.com
Nilsson, Håkan. "Reliable Communication of Time- and Security-Sensitive Information over a Single Combat Vehicle Network." Thesis, Linköpings universitet, Kommunikationssystem, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-162444.
Повний текст джерелаNguyen, Huy Manh. "MABIC: Mobile Application Builder for Interactive Communication." TopSCHOLAR®, 2016. http://digitalcommons.wku.edu/theses/1747.
Повний текст джерелаAlbehadili, Abdulsahib. "Link-signature in Physical Layer Security and Its Applications for PHY-key Generation, PHY-authentication, and Discriminatory Channel Estimation." University of Toledo / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1588784882183339.
Повний текст джерелаChinnam, S. "MULTI-WAY COMMUNICATION SYSTEM." CSUSB ScholarWorks, 2017. https://scholarworks.lib.csusb.edu/etd/443.
Повний текст джерелаКниги з теми "Security of information and communication systems"
Belkasmi, Mostafa, Jalel Ben-Othman, Cheng Li, and Mohamed Essaaidi, eds. Advanced Communication Systems and Information Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61143-9.
Повний текст джерелаSchmidt, Andreas U., Giovanni Russello, Antonio Lioy, Neeli R. Prasad, and Shiguo Lian, eds. Security and Privacy in Mobile Information and Communication Systems. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-17502-2.
Повний текст джерелаSchmidt, Andreas U., and Shiguo Lian, eds. Security and Privacy in Mobile Information and Communication Systems. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04434-2.
Повний текст джерелаPrasad, Ramjee, Károly Farkas, Andreas U. Schmidt, Antonio Lioy, Giovanni Russello, and Flaminia L. Luccio, eds. Security and Privacy in Mobile Information and Communication Systems. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30244-2.
Повний текст джерелаSchmidt, Andreas U., Giovanni Russello, Ioannis Krontiris, and Shiguo Lian, eds. Security and Privacy in Mobile Information and Communication Systems. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33392-7.
Повний текст джерелаJerman-Blažič, Borka. Advanced Communications and Multimedia Security: IFIP TC6. Boston, MA: Springer US, 2002.
Знайти повний текст джерелаIntroduction to communication electronic warfare systems. 2nd ed. Boston: Artech House, 2008.
Знайти повний текст джерелаVictoria. Office of the Auditor-General. WoVG information security management framework. Melbourne, Vic: Victorian Government Printer, 2013.
Знайти повний текст джерелаHarkins, Malcolm. Managing Risk and Information Security: Protect to Enable. Berkeley, CA: Apress, 2013.
Знайти повний текст джерелаP, Shim J., and SpringerLink (Online service), eds. Wireless Technology: Applications, Management, and Security. Boston, MA: Springer-Verlag US, 2009.
Знайти повний текст джерелаЧастини книг з теми "Security of information and communication systems"
Jajodia, Sushil. "Protecting Critical Information Systems." In Information and Communication Security, 143. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/978-3-540-47942-0_12.
Повний текст джерелаKaryda, Maria, Spyros Kokolakis, and Evangelos Kiountouzis. "Redefining Information Systems Security: Viable Information Systems." In IFIP Advances in Information and Communication Technology, 453–67. Boston, MA: Springer US, 2001. http://dx.doi.org/10.1007/0-306-46998-7_31.
Повний текст джерелаKesdogan, Dogan, Hannes Federrath, Anja Jerichow, and Andreas Pfitzmann. "Location Management Strategies Increasing Privacy in Mobile Communication." In Information Systems Security, 39–48. Boston, MA: Springer US, 1996. http://dx.doi.org/10.1007/978-1-5041-2919-0_4.
Повний текст джерелаMarsalek, Alexander, Bernd Prünster, Bojan Suzic, and Thomas Zefferer. "SeDiCom: A Secure Distributed Privacy-Preserving Communication Platform." In Information Systems Security, 345–63. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-05171-6_18.
Повний текст джерелаVeeningen, Meilof, Benne de Weger, and Nicola Zannone. "Formal Privacy Analysis of Communication Protocols for Identity Management." In Information Systems Security, 235–49. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25560-1_16.
Повний текст джерелаBag, Samiran, Sushmita Ruj, and Bimal Roy. "Jamming Resistant Schemes for Wireless Communication: A Combinatorial Approach." In Information Systems Security, 43–62. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-45204-8_4.
Повний текст джерелаHutchison, Andrew C. M., and Kurt Bauknecht. "Cryptographic key distribution and authentication protocols for secure group communication." In Information Systems Security, 492–93. Boston, MA: Springer US, 1996. http://dx.doi.org/10.1007/978-1-5041-2919-0_46.
Повний текст джерелаBhattacharya, Anup Kumar, Abhijit Das, Dipanwita Roychoudhury, Aravind Iyer, and Debojyoti Bhattacharya. "Autonomous Certification with List-Based Revocation for Secure V2V Communication." In Information Systems Security, 208–22. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35130-3_15.
Повний текст джерелаWeik, Martin H. "information systems security." In Computer Science and Communications Dictionary, 779. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_8970.
Повний текст джерелаBurghouwt, Pieter, Marcel Spruit, and Henk Sips. "Towards Detection of Botnet Communication through Social Media by Monitoring User Activity." In Information Systems Security, 131–43. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25560-1_9.
Повний текст джерелаТези доповідей конференцій з теми "Security of information and communication systems"
Blasch, Erik P., and Andrew Hoff. "Intelligent communication systems sensor scheduling based on network information." In Defense and Security, edited by Kevin L. Priddy. SPIE, 2004. http://dx.doi.org/10.1117/12.548124.
Повний текст джерелаAkopian, David, Philip Chen, Susheel Miryakar, and Abhinav Kumar. "Fast massive preventive security and information communication systems." In SPIE Defense and Security Symposium, edited by Sos S. Agaian and Sabah A. Jassim. SPIE, 2008. http://dx.doi.org/10.1117/12.777824.
Повний текст джерелаSkaves, Peter. "FAA Aircraft Systems Information Security Protection overview." In 2015 Integrated Communication, Navigation, and Surveillance Conference (ICNS). IEEE, 2015. http://dx.doi.org/10.1109/icnsurv.2015.7121212.
Повний текст джерелаRuhil, Neelam, Jitender Kumar, and Rajesh Kumar. "Information security: In android expedients." In The International Conference on Communication and Computing Systems (ICCCS-2016). Taylor & Francis Group, 6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL 33487-2742: CRC Press, 2016. http://dx.doi.org/10.1201/9781315364094-100.
Повний текст джерелаAlohali, Manal, Nathan Clarke, and Steven Furnell. "Information Security Risk Communication: A User-Centric Approach." In 2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA). IEEE, 2019. http://dx.doi.org/10.1109/aiccsa47632.2019.9035361.
Повний текст джерелаLiu, Xinlin, and Wei Liu. "Information Security Encryption Method for Intelligent Communication Terminal." In ICISCAE 2021: 2021 IEEE 4th International Conference on Information Systems and Computer Aided Education. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3482632.3487531.
Повний текст джерела"Workshop on future information security 2015." In 2015 7th International Conference on Communication Systems and Networks (COMSNETS). IEEE, 2015. http://dx.doi.org/10.1109/comsnets.2015.7098646.
Повний текст джерелаZhang, Wei, and Thelma Palaoag. "Improving Information Security in Smart City." In 2021 5th International Conference on Communication and Information Systems (ICCIS). IEEE, 2021. http://dx.doi.org/10.1109/iccis53528.2021.9645934.
Повний текст джерелаMisra, Manoj Kumar, Rashi Mathur, and Rishish Tripathi. "On Post Quantum Wireless Communication Security." In 2021 5th International Conference on Information Systems and Computer Networks (ISCON). IEEE, 2021. http://dx.doi.org/10.1109/iscon52037.2021.9702489.
Повний текст джерелаCao, Zhen, Hui Deng, Lu Lu, and Xiaodong Duan. "An information-theoretic security metric for future wireless communication systems." In 2014 XXXIth URSI General Assembly and Scientific Symposium (URSI GASS). IEEE, 2014. http://dx.doi.org/10.1109/ursigass.2014.6929296.
Повний текст джерелаЗвіти організацій з теми "Security of information and communication systems"
Cuff, Paul. Provable Security of Communication for Protecting Information Flow in Distributed Systems. Fort Belvoir, VA: Defense Technical Information Center, June 2015. http://dx.doi.org/10.21236/ada620103.
Повний текст джерелаBohl, Dwight. Communications and Information. Communications Security: Protected Distribution Systems (PDS). Fort Belvoir, VA: Defense Technical Information Center, December 2000. http://dx.doi.org/10.21236/ada404837.
Повний текст джерелаPerdigão, Rui A. P. Information physics and quantum space technologies for natural hazard sensing, modelling and prediction. Meteoceanics, September 2021. http://dx.doi.org/10.46337/210930.
Повний текст джерелаBraslavskaya, Elena, and Tatyana Pavlova. English for IT-Specialists. SIB-Expertise, June 2021. http://dx.doi.org/10.12731/er0464.21062021.
Повний текст джерелаKucherova, Hanna, Anastasiia Didenko, Olena Kravets, Yuliia Honcharenko, and Aleksandr Uchitel. Scenario forecasting information transparency of subjects' under uncertainty and development of the knowledge economy. [б. в.], October 2020. http://dx.doi.org/10.31812/123456789/4469.
Повний текст джерелаGrance, T., J. Hash, S. Peck, J. Smith, and K. Korow-Diks. Security guide for interconnecting information technology systems. Gaithersburg, MD: National Institute of Standards and Technology, 2002. http://dx.doi.org/10.6028/nist.sp.800-47.
Повний текст джерелаSwanson, M., N. Bartol, J. Sabato, J. Hash, and L. Graffo. Security metrics guide for information technology systems. Gaithersburg, MD: National Institute of Standards and Technology, 2003. http://dx.doi.org/10.6028/nist.sp.800-55.
Повний текст джерелаYeo, Tat S., and Xudong Chen. Establishing Information Security Systems via Optical Imaging. Fort Belvoir, VA: Defense Technical Information Center, August 2015. http://dx.doi.org/10.21236/ada623481.
Повний текст джерелаDempsey, K. L., N. S. Chawla, L. A. Johnson, R. Johnston, A. C. Jones, A. D. Orebaugh, M. A. Scholl, and K. M. Stine. Information Security Continuous Monitoring (ISCM) for federal information systems and organizations. Gaithersburg, MD: National Institute of Standards and Technology, 2011. http://dx.doi.org/10.6028/nist.sp.800-137.
Повний текст джерелаSwanson, Marianne. Security self-assessment guide for information technology systems. Gaithersburg, MD: National Institute of Standards and Technology, 2001. http://dx.doi.org/10.6028/nist.sp.800-26.
Повний текст джерела