نتایج جستجو برای: physical security
تعداد نتایج: 830792 فیلتر نتایج به سال:
With the exponential growth of cyber-physical systems (CPS), new security challenges have emerged. Various vulnerabilities, threats, attacks, and controls have been introduced for the new generation of CPS. However, there lack a systematic study of CPS security issues. In particular, the heterogeneity of CPS components and the diversity of CPS systems have made it very difficult to study the pr...
Physical security has received increased attention after 9/11. However, access control to physical units has not been explored much. On the other hand, there is a rich literature on access control to information. These two areas appear converging as seen by recent products and studies. However, use of different notations and implementation details make this convergence harder. We need to try to...
4 Digital Object Identifier 10.1109/MDAT.2017.2713356 Date of current version: 30 June 2017. The focus of this issue of IEEE Design&Test is on cyber–physical systems security and privacy. Research in cyber–physical systems (CPS) has enjoyed a large increase over the past years. The same holds for security and privacy. Hence, combining both in a special issue is very appealing. And indeed this...
Physical non-invasive security has become crucial for cryptographic modules, which are widely used in pervasive computing. International security evaluation standards, such as U.S. Federal Information Processing Standard (FIPS) 140-3 and Common Criteria (CC) part 3 have added special requirements addressing physical non-invasive security. However, these evaluation standards lack of quantitative...
Wireless multi-user MIMO communications are used more and more often to exchange sensitive data. Because of the broadcast nature of the physical medium, unauthorized receivers located within the transmission range can observe the signals sent by the transmitter to a legitimate receiver and eavesdrop them. Therefore, security has become an extremely important issue to deal with. Multiuser MIMO c...
The security goals of an organization are implemented through security policies, which concern physical security, digital security and security awareness. An insider is aware of these security policies, and might be able to thwart the security goals without violating any policies, by combining physical, digital and social means. This paper presents the Portunes model, a model for describing and...
Electric power grids have been identified as critical infrastructures. They are increasingly dependent on Information and Communication Technologies (ICTs) for the operation and control of physical facilities. It can be envisioned that on top of the power infrastructure reside ICT layers that are coupled with the electric grids. As the ICT connectivity increases, so does the potential for cyber...
This report is a detailed study of physical security methods available for protecting a data center. A preliminary analysis has been done on the data center located at the Department of Computer and Information Science (IDA) of Linköping University, Sweden. Various traditional methods for physical security are discussed in this report along with their implementation. The two appropriate solutio...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید