888,671 Hits in 8.5 sec


Ravshan Aliev, Komoliddin Toshmetov
2022 Berlin Studies in Knowledge Research  
The article examines the transmission of a tele control and telesignalization signal in the expert system for automatic control of train traffic, for the detection and control of train data, various types  ...  of systems for automatic control of train traffic are presented.  ...  Research the length of the braking distance for speed and high-speed trains on railway sections.  ... 
doi:10.47689/978-9943-7818-0-1-pp20-22 fatcat:uprnbguxtfa5hoexegkzu5kmxi

Data Security and Privacy in 2025? [chapter]

Matthias Schunter
2014 Lecture Notes in Computer Science  
Based on the projection of current trends, this vision paper aims at identifying potential security research needs for the next 10 years.  ...  Security research aims at reducing the risk of information technology.  ...  A resulting research challenge is the failure-resistant design of security systems.  ... 
doi:10.1007/978-3-319-06811-4_8 fatcat:st6pajzyb5dznd62xuk4uo7rbm

Responding to security incidents: are security tools everything you need?

Rodrigo Werlinger, Kirstie Hawkey, Konstantin Beznosov
2007 Zenodo  
FACTORS (Lack of) Budget Estimation of Risks Tight Schedules Security Low Priority Laboratory for Education and Research in Secure Systems Engineering ( 14 Security challenges  ...  (e.g., purchase new security tools, response to security incidents Laboratory for Education and Research in Secure Systems Engineering ( 15 Example Challenges of IT Security  ... 
doi:10.5281/zenodo.3264326 fatcat:uerk3tcxfrcj3cuhh4lc3ctp4a

An integrated view of human, organizational, and technological challenges of IT security management

Rodrigo Werlinger, Kirstie Hawkey, Konstantin Beznosov, Steven M. Furnell
2009 Information Management & Computer Security  
Several opportunities for researchers and developers to improve the technology and processes used to support adoption of security policies and standards within organizations are provided.  ...  It also provides a way to understand the interplay of the different factors, for example, how the culture of the organization and decentralization of IT security trigger security issues that make security  ...  Members of the HOT Admin project and the Laboratory for Education and Research in Secure Systems Engineering (LERSSE) gave periodic feedback on the research reported in current and early drafts of this  ... 
doi:10.1108/09685220910944722 fatcat:y5ech54j4zh25f2cybdh3qtv6u

First Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC)

Roshan K. Thomas, Alvaro A. Cardenas, Rakesh B. Bobba
2015 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS '15  
The attack surface imposed by the convergence of computing, communications and physical control represents unique challenges for security researchers and practitioners.  ...  and privacy of CPS and galvanizing the research community.  ...  Trust management between the components of a control system is also a challenging area for future work.  ... 
doi:10.1145/2810103.2812621 dblp:conf/ccs/ThomasCB15 fatcat:zkpdeooepfbchgu24cm4uye2ea

Internet of Things Security Research: A Rehash of Old Ideas or New Intellectual Challenges? [article]

Earlence Fernandes, Amir Rahmati, Kevin Eykholt, Atul Prakash
2017 arXiv   pre-print
This article summarizes the intellectual similarities and differences between classic information technology security research and IoT security research.  ...  And, what are the new problems and challenges in this space that require new security mechanisms?  ...  Although the research community has begun tackling challenges in securing the IoT, an often asked question is: What are the new intellectual challenges in the science of security when we talk about the  ... 
arXiv:1705.08522v2 fatcat:kt2z5w7qqzb3vebp6f666tbzwe

Open Challenges in Internet of Things Security

Ali Selamat, Zeinab Iqal
2020 Journal of Physics, Conference Series  
In this paper, IoT security challenges was explored collected and categorized, for the purpose of having big picture for the situation.  ...  The result of the analysis gives a clear idea about the importance of IoT security, it provides us of motivation for more researches in this area.  ...  of the system [5] as security requirements. • Smart transportation, which responsible for controlling traffic, parking and public transportation [18] , with the importance to achieve availability, authentication  ... 
doi:10.1088/1742-6596/1447/1/012054 fatcat:ye2q5gx6lbgxlmkfvpcpbo6bgy

Enhancing Risk-Based Decisions by Leveraging Cyber Security Automation

Tina AlSadhan, Joon S. Park
2016 2016 European Intelligence and Security Informatics Conference (EISIC)  
Due to the large scale, complex and dynamic state of cyber environments, the exponential growth of vulnerabilities and the advanced persistent threat to information systems, automation is indispensable  ...  Although automation is already an integral part of many cyber security operations, there still are challenges to overcome to fully achieve Information Security Continuous Monitoring (ISCM) capabilities  ...  The research will focus on automation of security controls in respect to unclassified Information Systems and will not include any industrial controls systems, utility monitoring and controls systems,  ... 
doi:10.1109/eisic.2016.042 dblp:conf/eisic/AlsadhanP16 fatcat:a7zfathiqfddhnpqewdzsqvity

Improving Software Defined Cognitive and Secure Networking [article]

Ijaz Ahmad
2020 arXiv   pre-print
Furthermore, this thesis also investigates the potential security challenges and their solutions for the enabling technologies of 5G, such as SDN, cloud technologies, and virtual network functions, and  ...  Since SDN enables applications to change the network behavior and centralizes the network control plane to oversee the whole network, it is highly important to investigate security of SDNs.  ...  Analysis of security challenges in SDN, solutions proposed for those challenges and future research directions for potential security vulnerabilities in SDN (Paper IV). 4.  ... 
arXiv:2007.05296v1 fatcat:pda2czqmxbavhpc6bk3bdciyay

Cloud-Based Cyber Physical Systems: Design Challenges and Security Needs

Yenumula B. Reddy
2014 2014 10th International Conference on Mobile Ad-hoc and Sensor Networks  
Second, we introduced the challenges ahead to the design and development of the future engineering systems with new security capabilities.  ...  The research in cyberphysical systems is in its initial stage. Therefore, first we discussed the status of security in cloud cyber-physical systems.  ...  ACKNOWLEDGEMENTS The research work was supported by the AFRL Collaboration Program -Sensors Research, Air Force Contract FA8650-13-C-5800, through subcontract number GRAM 13-S7700-02-C2.  ... 
doi:10.1109/msn.2014.50 dblp:conf/msn/Reddy14 fatcat:morqoyy3vvgxhnpyugnggdadiu

Engineering future cyber-physical energy systems: Challenges, research needs, and roadmap

Thomas H. Morris, Anurag K. Srivastava, Bradley Reaves, Kalyan Pavurapu, Sherif Abdelwahed, Rayford Vaughn, Wesley McGrew, Yoginder Dandass
2009 41st North American Power Symposium  
In this paper, we present common challenges and our vision of solutions to design advanced Cyberphysical energy systems with embedded security and distributed control.  ...  system, a new paradigm for modeling and research investigation is needed.  ...  SUMMARY In this paper we provided a set of challenges for cyberphysical energy system research. Next we provided a road map of research required to secure cyber-physical energy systems.  ... 
doi:10.1109/naps.2009.5484019 fatcat:7zmsdu4owfej7iomktccv3xmd4

A systematic review on security in Process-Aware Information Systems – Constitution, challenges, and future directions

Maria Leitner, Stefanie Rinderle-Ma
2014 Information and Software Technology  
We show that state of the art provides a rich set of methods such as access control models but still several open research challenges remain.  ...  In addition, the proliferation of literature makes it cumbersome to overlook and determine state of the art and further to identify research challenges and gaps.  ...  (4) What are the challenges of current security research in Process-Aware Information Systems?  ... 
doi:10.1016/j.infsof.2013.12.004 fatcat:6gdf7utmn5aeldakkkxph3l4ei

Security Challenges in Healthcare Cloud Computing: A Systematic Review

Esmaeil Mehraeen, Marjan Ghazisaeedi, Jebraeil Farzi, Saghar Mirshekari
2016 Global Journal of Health Science  
, security challenges of the wireless networks need to be carefully understood and considered.  ...  </p><p><strong>FINDINGS:</strong> Using the strategies described, 666 references retrieved (for research question one 365, research question two 201, and research question three 100 references).  ...  Acknowledgments This study was funded and supported by Tehran University of Medical Sciences (TUMS).  ... 
doi:10.5539/gjhs.v9n3p157 fatcat:xd34edfsyneyhfwxrou7vaiy4i

Security Policies in Adaptive Process-Aware Information Systems: Existing Approaches and Challenges

Maria Leitner
2011 2011 Sixth International Conference on Availability, Reliability and Security  
Enabling security is one of the key challenges in adaptive Process-Aware Information Systems (PAIS).  ...  Furthermore, a detailed analysis of research challenges and issues is presented. We will show that there are still shortcomings and identify important requirements for security in PAIS.  ...  Challenge 4: Process Evolution Current research manages secure process changes with access control models (e.g. [17] ).  ... 
doi:10.1109/ares.2011.107 dblp:conf/IEEEares/Leitner11 fatcat:aapxtzxd7vglxptamc3q3obypq

Editorial: Introduction to Data Security and Privacy

Elisa Bertino
2016 Data Science and Engineering  
Research has been very active in designing techniques for data protection over the past 20 years.  ...  The widespread and intensive use of data for many different tasks makes, however, data security, trustworthiness, and privacy increasingly critical requirements.  ...  Data Integration Systems Security Policies'' address the challenging problem of assuring data confidentiality, privacy, and trust in the context of data integration systems.  ... 
doi:10.1007/s41019-016-0021-1 fatcat:pi7esz2rs5e2hkemmyvjsvpaeu
« Previous Showing results 1 — 15 out of 888,671 results