System security in the networked library: Introduction

被引:0
|
作者
Lavagnino, MB
机构
关键词
D O I
暂无
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
引用
收藏
页码:9 / 10
页数:2
相关论文
共 50 条
  • [1] CYBERPHYSICAL SECURITY IN NETWORKED CONTROL SYSTEMS AN INTRODUCTION TO THE ISSUE
    Sandberg, Henrik
    Amin, Saurabh
    Johansson, Karl Henrik
    [J]. IEEE CONTROL SYSTEMS MAGAZINE, 2015, 35 (01): : 20 - 23
  • [2] A security model for networked manufacturing system
    Wang, Lujiong
    Li, Aiping
    Xu, Liyun
    [J]. CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 745 - 749
  • [3] Networked test system and its security design
    Han, HL
    Xu, L
    Gong, QY
    Dai, XJ
    Huang, ZG
    Tan, T
    [J]. ISTM/2005: 6TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-9, CONFERENCE PROCEEDINGS, 2005, : 9323 - 9326
  • [4] Evolution of a security system in a small library
    Maxson, K
    [J]. IAMSLIC 2000: TIDES OF TECHNOLOGY, 2001, : 43 - 48
  • [5] Foreword to the special issue on networked system security and efficiency
    Wang, Xiaofei
    Ren, Jianji
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (16):
  • [6] Wireless Networked Security System Based on ZigBee Technology
    Cao, Liting
    Liu, Yanxia
    Yang, Shuo
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4774 - 4777
  • [7] Security framework for networked storage system based on artificial immune system
    Huang, Jianzhong
    Xie, Changsheng
    Zhang, Chengfeng
    Zhan, Ling
    [J]. REMOTE SENSING AND GIS DATA PROCESSING AND APPLICATIONS; AND INNOVATIVE MULTISPECTRAL TECHNOLOGY AND APPLICATIONS, PTS 1 AND 2, 2007, 6790
  • [8] Cyber-physical system security for networked industrial processes
    Huang S.
    Zhou C.-J.
    Yang S.-H.
    Qin Y.-Q.
    [J]. International Journal of Automation and Computing, 2015, 12 (06) : 567 - 578
  • [9] Cyber-physical System Security for Networked Industrial Processes
    Shuang Huang
    Chun-Jie Zhou
    Shuang-Hua Yang
    Yuan-Qing Qin
    [J]. International Journal of Automation and Computing, 2015, 12 (06) : 567 - 578
  • [10] Security Analysis of a Distributed Networked System Under Eavesdropping Attacks
    Yang, Wen
    Zheng, Ziqian
    Chen, Guanrong
    Tang, Yang
    Wang, Xiaofan
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2020, 67 (07) : 1254 - 1258