نتایج جستجو برای: physical security

تعداد نتایج: 830792  

Journal: :IEEE Internet of Things Journal 2017
Abdulmalik Humayed Jingqiang Lin Fengjun Li Bo Luo

With the exponential growth of cyber-physical systems (CPS), new security challenges have emerged. Various vulnerabilities, threats, attacks, and controls have been introduced for the new generation of CPS. However, there lack a systematic study of CPS security issues. In particular, the heterogeneity of CPS components and the diversity of CPS systems have made it very difficult to study the pr...

2007
Eduardo B. Fernández Jose Ballesteros Ana C. Desouza-Doucet María M. Larrondo-Petrie

Physical security has received increased attention after 9/11. However, access control to physical units has not been explored much. On the other hand, there is a rich literature on access control to information. These two areas appear converging as seen by recent products and studies. However, use of different notations and implementation details make this convergence harder. We need to try to...

Journal: :IEEE Design & Test 2017
Jörg Henkel

4 Digital Object Identifier 10.1109/MDAT.2017.2713356 Date of current version: 30 June 2017.  The focus of this issue of IEEE Design&Test is on cyber–physical systems security and privacy. Research in cyber–physical systems (CPS) has enjoyed a large increase over the past years. The same holds for security and privacy. Hence, combining both in a special issue is very appealing. And indeed this...

2010
Huiyun Li Keke Wu Fengqi Yu Hai Yuan

Physical non-invasive security has become crucial for cryptographic modules, which are widely used in pervasive computing. International security evaluation standards, such as U.S. Federal Information Processing Standard (FIPS) 140-3 and Common Criteria (CC) part 3 have added special requirements addressing physical non-invasive security. However, these evaluation standards lack of quantitative...

2013
Giovanni Geraci Jinhong Yuan

Wireless multi-user MIMO communications are used more and more often to exchange sensitive data. Because of the broadcast nature of the physical medium, unauthorized receivers located within the transmission range can observe the signals sent by the transmitter to a legitimate receiver and eavesdrop them. Therefore, security has become an extremely important issue to deal with. Multiuser MIMO c...

2009
Trajce Dimkov Wolter Pieters Pieter Hartel

The security goals of an organization are implemented through security policies, which concern physical security, digital security and security awareness. An insider is aware of these security policies, and might be able to thwart the security goals without violating any policies, by combining physical, digital and social means. This paper presents the Portunes model, a model for describing and...

2014
Alexandru Stefanov Chen-Ching Liu

Electric power grids have been identified as critical infrastructures. They are increasingly dependent on Information and Communication Technologies (ICTs) for the operation and control of physical facilities. It can be envisioned that on top of the power infrastructure reside ICT layers that are coupled with the electric grids. As the ICT connectivity increases, so does the potential for cyber...

2009
Muhammad Salman Khan Juha Takkinen

This report is a detailed study of physical security methods available for protecting a data center. A preliminary analysis has been done on the data center located at the Department of Computer and Information Science (IDA) of Linköping University, Sweden. Various traditional methods for physical security are discussed in this report along with their implementation. The two appropriate solutio...

2016
Muhammad Naveed Aman Kee Chaing Chua Biplab Sikdar

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید