Articles with "security monitoring" as a keyword



Photo by scottwebb from unsplash

Research and Application of Wireless Security Monitoring System in Chemistry and Chemical Engineering Laboratory

Sign Up to like & get
recommendations!
Published in 2017 at "Wireless Personal Communications"

DOI: 10.1007/s11277-017-4106-6

Abstract: In this paper, a wireless security monitoring system is developed for the safety of chemistry and chemical laboratories. The remote monitoring and control functions of the laboratory are realized by receiving the information from the… read more here.

Keywords: monitoring system; chemistry chemical; chemistry; security monitoring ... See more keywords
Photo from wikipedia

Framework for Mobile Internet of Things Security Monitoring Based on Big Data Processing and Machine Learning

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2881998

Abstract: The paper discusses a new framework combining the possibilities of Big Data processing and machine leaning developed for security monitoring of mobile Internet of Things. The mathematical foundations and the problem statement are considered. The… read more here.

Keywords: framework; machine; security monitoring; big data ... See more keywords
Photo from wikipedia

Data Auditing for Intelligent Network Security Monitoring

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Communications Magazine"

DOI: 10.1109/mcom.003.2200046

Abstract: Data auditing is a process to consistently keep the quality of data high, but this process is generally missing in network security monitoring. When network-based intrusion detection systems catch any suspicious packet, they generate alert… read more here.

Keywords: network; security; security monitoring; network security ... See more keywords
Photo from wikipedia

Intelligent Network Security Monitoring Based on Optimum-Path Forest Clustering

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Network"

DOI: 10.1109/mnet.2018.1800151

Abstract: Distinguishing outliers from normal data in wireless sensor networks has been a big challenge in the anomaly detection domain, mostly due to the nature of the anomalies, such as software or hardware failures, reading errors… read more here.

Keywords: security monitoring; network security; monitoring based; anomaly detection ... See more keywords
Photo by dulhiier from unsplash

Security Monitoring of IEC 61850 Substations Using IEC 62351-7 Network and System Management

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Industrial Informatics"

DOI: 10.1109/tii.2021.3082079

Abstract: According to the IEC 62351-7 standard, data collection using network and system management (NSM) can be used to support the security monitoring of the smart grid. In this article, an NSM security monitoring platform for… read more here.

Keywords: system; network; iec; iec 62351 ... See more keywords
Photo from wikipedia

Data-Driven Transient Stability Boundary Generation for Online Security Monitoring

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Transactions on Power Systems"

DOI: 10.1109/tpwrs.2020.3042210

Abstract: Transient stability boundary (TSB) is an important tool in power system online security monitoring, but practically it suffers from high computational burden using state-of-the-art methods, such as time-domain simulation (TDS), with numerous scenarios taken into… read more here.

Keywords: security monitoring; stability boundary; online security; transient stability ... See more keywords
Photo by larskienle from unsplash

Blockchain-Based Cloud-Enabled Security Monitoring Using Internet of Things in Smart Agriculture

Sign Up to like & get
recommendations!
Published in 2022 at "Future Internet"

DOI: 10.3390/fi14090250

Abstract: The Internet of Things (IoT) has rapidly progressed in recent years and immensely influenced many industries in how they operate. Consequently, IoT technology has improved productivity in many sectors, and smart farming has also hugely… read more here.

Keywords: cloud; security; internet things; security monitoring ... See more keywords
Photo by scottwebb from unsplash

Key Concepts of Systemological Approach to CPS Adaptive Information Security Monitoring

Sign Up to like & get
recommendations!
Published in 2021 at "Symmetry"

DOI: 10.3390/sym13122425

Abstract: Modern cyber-physical systems (CPS) use digital control of physical processes. This allows attackers to conduct various cyberattacks on these systems. According to the current trends, an information security monitoring system (ISMS) becomes part of a… read more here.

Keywords: information security; security; cps; security monitoring ... See more keywords