Security automation: The degree of information security in automated systems for process industry

被引:0
|
作者
Kruschitz, Erwin [1 ]
机构
[1] Anapur AG, Ludwigshafen, Germany
来源
AUTOMATION 2009 | 2009年 / 2067卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:301 / 304
页数:4
相关论文
共 50 条
  • [11] Security in Building Automation Systems
    Granzer, Wolfgang
    Praus, Fritz
    Kastner, Wolfgang
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2010, 57 (11) : 3622 - 3630
  • [12] Automation of Information Security Risk Assessment
    Akhmetov, Berik
    Lakhno, Valerii
    Chubaievskyi, Vitalyi
    Kaminskyi, Serhii
    Adilzhanova, Saltanat
    Ydyryshbayeva, Moldir
    [J]. INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2022, 68 (03) : 549 - +
  • [13] Automated Decentralized IT Security Supervision in Automation Networks
    Runde, Markus
    Tebbe, Christopher
    Niemann, Karl-Heinz
    Toemmler, Jonas
    [J]. 2012 10TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2012, : 1234 - 1239
  • [14] Information security management: An information security retrieval and awareness model for industry
    Kritzinger, E.
    Smith, E.
    [J]. COMPUTERS & SECURITY, 2008, 27 (5-6) : 224 - 231
  • [15] On Using the Stochastic Superindicator for Information Security Evaluation in Automated Systems
    Eremeev, M. A.
    Gorbachev, I. E.
    [J]. AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2015, 49 (08) : 653 - 658
  • [16] The Information Security in Semiconductor Industry
    Zhao, Shirley
    Zhu, Sherry
    Guo, Sherry
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT (IEEM), 2015, : 1782 - 1785
  • [17] A process model for implementing information systems security governance
    Nicho, Mathew
    [J]. INFORMATION AND COMPUTER SECURITY, 2018, 26 (01) : 10 - 38
  • [18] The Information Systems Security Process: Through an Anthropological Lens
    Freeman, Amanda
    Stapleton, Larry
    Byrne, Gabriel
    [J]. INFORMATION SYSTEMS DEVELOPMENT: CHALLENGES IN PRACTICE, THEORY AND EDUCATION, VOLS 1AND 2, 2009, : 741 - 752
  • [19] Security in SCADA systems: How to handle the growing menace to process automation
    Brown, T
    [J]. COMPUTING AND CONTROL ENGINEERING, 2005, 16 (03): : 42 - 47
  • [20] Security of information in IT systems
    Kaliczynska, M
    [J]. Photonics Applications in Astronomy, Communications, Industry, and High-Energy Physics Experiments III, 2005, 5775 : 571 - 576