Control system security

Results: 2384



#Item
481Access control / Computer security / Information retrieval / Collaborative filtering / Social information processing / Recommender system / Role-based access control / Shared resource / Document collaboration / Collaboration / Security / Computing

Using Recommenders for Discretionary Access Control Suresh Chari Larry Koved Mary Ellen Zurko IBM Research IBM Software Group

Add to Reading List

Source URL: w2spconf.com

Language: English - Date: 2012-02-07 16:10:04
482Network management / System software / Computer network security / Internet standards / System administration / Simple Network Management Protocol / Internetwork Packet Exchange / Network switch / Virtual LAN / Computing / Network architecture / Internet protocols

ComView IPx ComView IPx is a multi-functional device designed for remote equipment access, control, and alarm monitoring applications that require a high level of integration of serial and network connectivity ComView I

Add to Reading List

Source URL: www.csstel.com

Language: English - Date: 2014-06-20 16:22:59
483Fuzzy logic / Non-classical logic / Cloud computing / Security / Fuzzy control system / Computer security / Logic / Artificial intelligence / Logic in computer science

A Cloud Trust Evaluation System Using Hierarchical Fuzzy Inference System for Service Selection

Add to Reading List

Source URL: www.cloudbus.org

Language: English - Date: 2014-06-16 02:04:54
484Electronic navigation / Federal Aviation Administration / Next Generation Air Transportation System / Computer security / Security / Aviation / Transport

GAOHighlights, AIR TRAFFIC CONTROL: FAA Needs a More Comprehensive Approach to Address Cybersecurity Challenges As Agency Transitions to NextGen

Add to Reading List

Source URL: gao.gov

Language: English - Date: 2015-04-14 15:37:06
485Network architecture / Network management / Internet standards / Computer network security / System administration / Modbus / Simple Network Management Protocol / RADIUS / SMS / Computing / Technology / Internet protocols

ComView WS ComView WS is a wireless, SNMP and Modbus RTU/ TCPmanageable, multi-functional device designed for remote equipment access, control, and alarm monitoring applications that require convenient use of mobile pho

Add to Reading List

Source URL: www.csstel.com

Language: English - Date: 2014-06-20 16:24:11
486Computer network security / Evasion / Metasploit Project / Internet protocol suite / IP fragmentation / Data link layer / Transmission Control Protocol / Internet Protocol / Intrusion detection system evasion techniques / Computing / Cyberwarfare / Computer security

Thermoptic Camouflage TOTAL IDS EVASION Brian Caswell H D Moore

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
487Federal Aviation Administration / Air safety / Air Traffic Organization / Next Generation Air Transportation System / System Wide Information Management / Automatic dependent surveillance-broadcast / Computer security / Federal Information Security Management Act / Joint Planning and Development Office / Aviation / Air traffic control / Transport

GAOAccessible Version, Air Traffic Control: FAA Needs a More Comprehensive Approach to Address Cybersecurity As Agency Transitions to NextGen

Add to Reading List

Source URL: gao.gov

Language: English - Date: 2015-04-16 17:10:02
488Cyberwarfare / Computer networking / Pcap / Firewall / Transmission Control Protocol / Traffic flow / Internet protocol suite / Packet Processing / Port / Computing / Software / Computer network security

Bro: A System for Detecting Network Intruders in Real-Time Vern Paxson Lawrence Berkeley National Laboratory, Berkeley, CA and AT&T Center for Internet Research at ICSI, Berkeley, CA

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-01-24 05:22:35
489Computer network security / Internet protocols / OSI protocols / Transmission Control Protocol / Snort / Network intrusion detection system / Network packet / Transport layer / Traffic flow / Software / Computing / System software

A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems (Extended Abstract) Leo Juan1 , Christian Kreibich2 , Chih-Hung Lin1 , and Vern Paxson2 1

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-05-23 21:17:18
490Prevention / Burglar alarm / Smoke detector / Password / Panic button / Alarm devices / Remote control / Motion detector / Siren / Safety / Security / Alarms

JFX-2005-I Wireless Security Alarm System User’s Manual Please read particulars before you use it.

Add to Reading List

Source URL: www.alarmsysteemid.ee

Language: English - Date: 2007-12-13 11:23:11
UPDATE