Control system security

Results: 2384



#Item
31Espionage / Intelligence gathering disciplines / Signals intelligence / Security / Mass surveillance / National Reconnaissance Office / Military intelligence / National Security Agency / Byeman Control System

aj.v? /V rtmSA (Cli4:)/DDS&TNRO APPROVED FOR RELEAZ 1 AUGUST 2015

Add to Reading List

Source URL: www.nro.gov

Language: English - Date: 2015-08-10 13:14:10
32Prevention / Password / Security / Workweek and weekend / Break / Login / Access control / Safety

Associate E-Connect Instructions – WI/MN Manpower utilizes an electronic timekeeping system (E-Connect) to manage your hours/payroll for your assignment. Each week you will need to log-in to E-Connect to enter your tim

Add to Reading List

Source URL: www.mnpwr.com

Language: English - Date: 2016-06-14 09:25:13
33Biometrics / Fingerprints / Feature detection / Surveillance / Security / Fingerprint recognition / Image processing / Access control / Fingerprint Verification Competition / Fingerprint / Speeded up robust features / Integrated Automated Fingerprint Identification System

Issues in rotational (non-)invariance and image preprocessing Lalit Jain1 , Michael J. Wilber1,2 , Terrance E. Boult1,2 1 VAST Lab, University of Colorado Colorado Springs 2 Securics Inc {ljain2 | mwilber | tboult} @vast

Add to Reading List

Source URL: www.vast.uccs.edu

Language: English - Date: 2013-09-01 22:24:19
34Computing / Computer architecture / Technology / Emerging technologies / Needham /  Massachusetts / Positive train control / Wind River Systems / Internet of things / VxWorks / PTC / Embedded system / Computer security

The Intelligence in the Internet of Things INTERNET OF THINGS: TRANSPORTATION USE CASE has implications that extend beyond rail systems. Regardless of the mode of transportation, system operators are concerned with the

Add to Reading List

Source URL: www.windriver.com

Language: English - Date: 2014-04-09 23:14:42
35Technology / Advanced driver assistance systems / Security / Vehicle telematics / Wireless networking / Global Positioning System / Autonomous cruise control system / Computer security / Vehicle-to-vehicle / Vehicular automation / Autonomous car

Vehicle Trust Management for Connected Vehicles FINAL RESEARCH REPORT Insup Lee (PI), Nicola Bezzo, Jian Chang Contract No. DTRT12GUTG11

Add to Reading List

Source URL: utc.ices.cmu.edu

Language: English - Date: 2016-04-08 11:05:18
36Computer security / System software / Software / Trusted computing base / Mandatory access control / Security-Enhanced Linux / Kernel / Policy Monitoring / System call / XTS-400

The Case for Abstracting Security Policies   

Add to Reading List

Source URL: rich.recoil.org

Language: English - Date: 2006-04-13 14:58:02
37Identity management / Computer access control / FIPS 201 / Standards / Presidential directive / Cryptography / Authentication / Credential / Interoperability / Computer security / Engineering

Identity Management Focuses on Credentialing HSPD-12 Will Serve as a Unifier for Agencies Security Inc. of Redwood City, Calif., 59 percent of system integrators (SIs) surveyed see the lack of

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2012-07-10 20:41:46
38Cryptography / Security / Engineering / Notary / Public-key cryptography / Computer access control / Access control / Authentication / Packaging / Global Positioning System / Reliability engineering / Satellite navigation

A Secure Civil GNSS: Satellite signal authentication and location & time verification using hidden signatures David De Lorenzo, Sherman Lo, Per Enge October 21, 2009

Add to Reading List

Source URL: scpnt.stanford.edu

Language: English - Date: 2009-10-27 13:42:56
39Rescue / Law of the sea / Emergency management / Beacons / Safety / International Cospas-Sarsat Programme / Emergency position-indicating radiobeacon station / Mission Control Centre / Electric beacon / Ship Security Alert System / Web beacon

United States Mission Control Center (USMCC) National Rescue Coordination Center (RCC) and Search and Rescue Point of Contact (SPOC) 406 MHz Alert and Support Messages

Add to Reading List

Source URL: www.sarsat.noaa.gov

Language: English - Date: 2016-03-01 08:33:03
40Software / Computing / System software / Computer network security / Iptables / Packet processing / Firewall / Netfilter / Communications protocol / Transmission Control Protocol / Ipfirewall / Statistical classification

Trees in the List: Accelerating List-based Packet Classification Through Controlled Rule Set Expansion Sven Hager Stefan Selent

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2014-12-01 16:55:48
UPDATE