Application of a technique for secure embedded device design based on combining security components for creation of a perimeter protection system

V Desnitsky, A Chechulin, I Kotenko… - 2016 24th Euromicro …, 2016 - ieeexplore.ieee.org
… of a secure system for room perimeter protection (in its part of … problem of construction of a
perimeter protection system based … This system should control physical access to a building (…

[КНИГА][B] Perimeter security

MJ Arata - 2006 - gisf.ngo
… We are only going to focus on physical perimeter security in … to design a soundproof room.
Other countermeasures that … standard for designing and constructing a perimeter chain-link …

[PDF][PDF] Physical security in mission critical facilities

S Niles - Schneider Electric, 2004 - academia.edu
… PIN; entry to the computer room might require a keypad code … architectural and construction
features that discourage or … protection of all the outer concentric perimeters that contain it. …

Building security perimeters to protect network systems against cyber threats [future directions]

D Puthal, SP Mohanty, P Nanda… - IEEE Consumer …, 2017 - ieeexplore.ieee.org
… Internet of Things (IoT), and cyberphysical systems, facilitate the design and operations of
… -based cyberspace by building a simple and dynamic security perimeter in any space in the …

[PDF][PDF] Modern Innovative Detectors of Physical Threats for Critical Infrastructures

R Makri, P Karaivazoglou, A Kyritsis… - CYBER-PHYSICAL …, 2020 - library.oapen.org
… can be met with another access challenge at a perimeter further in. This can be employed in
… site or building perimeter, computer area, and computer rooms along with equipment racks) …

Applying computer-based simulation to energy auditing: A case study

Y Zhu - Energy and buildings, 2006 - Elsevier
… the building characteristics acquired from our building survey … and the thermal characteristics
of the physical partitions of the … , the perimeter spaces, strips of space around the building, …

Health monitoring system developed for Tianjin 117 high-rise building

T Liu, B Yang, Q Zhang - Journal of Aerospace Engineering, 2017 - ascelibrary.org
… development of monitoring hardware and software, the … of the perimeter subcolumns and
maximize the usable space … for the protection and operation of the physical environment. …

[PDF][PDF] Enhancement of Physical Security Control for Data Centre and Perimeter in Banking: A Case Study of Central Bank of Sudan (CBOS)

FI Salih, HB Abas, A Azizan, SM Daud - Open International Journal of …, 2018 - academia.edu
… Other than that, usage of modern system with total solution including hardware, software, …
to monitor movement inside the building especially at the meeting rooms in common area. …

Construction of integrated land‐space loss prevention and crime prevention system of prison

X Qi, D Feng, J Luo - The Journal of Engineering, 2019 - Wiley Online Library
prevention, physical protection, technical prevention are … The range of perimeter protection
in prison is very large. Once … Intercom equipment, which has RFID tags on the criminal's …

[КНИГА][B] Physical security systems handbook: The design and implementation of electronic security systems

M Khairallah - 2005 - books.google.com
… the structural elements of the building or perimeter fencing. … and power equipment for the
security system equipment has … rooms and their location relative to the protected perimeters. …