Zeitschriftenartikel zum Thema „Cyber security management tool“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Cyber security management tool" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Štitilis, Darius, Irmantas Rotomskis, Marius Laurinaitis, Sergiy Nadvynychnyy und Nadiya Khorunzhak. „National cyber security strategies: management, unification and assessment“. Independent Journal of Management & Production 11, Nr. 9 (01.11.2020): 2341. http://dx.doi.org/10.14807/ijmp.v11i9.1431.
Der volle Inhalt der QuelleFakiha, Bandr. „Business Organization Security Strategies to Cyber Security Threats“. International Journal of Safety and Security Engineering 11, Nr. 1 (28.02.2021): 101–4. http://dx.doi.org/10.18280/ijsse.110111.
Der volle Inhalt der QuelleСуворов, Александр, Aleksandr Suvorov, Мария Матанцева, Mariya Matanceva, Евгения Плотникова und Evgeniya Plotnikova. „Cyber Insurance as a Way of Cyber Risks Management“. Safety in Technosphere 7, Nr. 5 (19.11.2019): 35–42. http://dx.doi.org/10.12737/article_5d8b1f1205ad35.02378913.
Der volle Inhalt der QuelleSvilicic, Boris, Junzo Kamahara, Matthew Rooks und Yoshiji Yano. „Maritime Cyber Risk Management: An Experimental Ship Assessment“. Journal of Navigation 72, Nr. 5 (07.02.2019): 1108–20. http://dx.doi.org/10.1017/s0373463318001157.
Der volle Inhalt der QuelleKaragozlu, Damla. „Determination of cyber security ensuring behaviours of pre-service teachers“. Cypriot Journal of Educational Sciences 15, Nr. 6 (31.12.2020): 1698–706. http://dx.doi.org/10.18844/cjes.v15i6.5327.
Der volle Inhalt der QuelleKachynskyi, A. B., und M. S. Stremetska. „Operational analytics as a data monitoring and event management tool of the cyber security management systems“. Reports of the National Academy of Sciences of Ukraine, Nr. 1 (Februar 2021): 9–16. http://dx.doi.org/10.15407/dopovidi2021.01.009.
Der volle Inhalt der QuelleRusso, Pietro, Alberto Caponi, Marco Leuti und Giuseppe Bianchi. „A Web Platform for Integrated Vulnerability Assessment and Cyber Risk Management“. Information 10, Nr. 7 (17.07.2019): 242. http://dx.doi.org/10.3390/info10070242.
Der volle Inhalt der QuelleAtoum, Issa, Ahmed Otoom und Amer Abu Ali. „A holistic cyber security implementation framework“. Information Management & Computer Security 22, Nr. 3 (08.07.2014): 251–64. http://dx.doi.org/10.1108/imcs-02-2013-0014.
Der volle Inhalt der QuellePavlík, Lukáš, Ekaterina Chytilová und Jarmila Zimmermannová. „Security Aspects of Healthcare Organization from the Perspective of Digitization of Facility Management“. WSEAS TRANSACTIONS ON BUSINESS AND ECONOMICS 18 (25.01.2021): 360–66. http://dx.doi.org/10.37394/23207.2021.18.36.
Der volle Inhalt der QuelleComizio, V. Gerard, Behnam Dayanim und Laura Bain. „Cybersecurity as a global concern in need of global solutions: an overview of financial regulatory developments in 2015“. Journal of Investment Compliance 17, Nr. 1 (03.05.2016): 101–11. http://dx.doi.org/10.1108/joic-01-2016-0003.
Der volle Inhalt der QuelleRani, Nazatul Shima Abdul, K. Sarojani Krishnan, Khairul Azizan Suda und Chahhoub Fatimazahra. „An Effective Model for Fraud Risk Management in Mitigating Telecommunication Fraud Incidences“. Asia Proceedings of Social Sciences 8, Nr. 2 (11.06.2021): 112–16. http://dx.doi.org/10.31580/apss.v8i2.1919.
Der volle Inhalt der QuelleGonzález-Granadillo, Gustavo, Susana González-Zarzosa und Rodrigo Diaz. „Security Information and Event Management (SIEM): Analysis, Trends, and Usage in Critical Infrastructures“. Sensors 21, Nr. 14 (12.07.2021): 4759. http://dx.doi.org/10.3390/s21144759.
Der volle Inhalt der QuelleGonzalez-Granadillo, Gustavo, Sofia Anna Menesidou, Dimitrios Papamartzivanos, Ramon Romeu, Diana Navarro-Llobet, Caxton Okoh, Sokratis Nifakos, Christos Xenakis und Emmanouil Panaousis. „Automated Cyber and Privacy Risk Management Toolkit“. Sensors 21, Nr. 16 (15.08.2021): 5493. http://dx.doi.org/10.3390/s21165493.
Der volle Inhalt der QuelleШумилина, Ольга, Ирина Езангина und Irina Ezangina. „Management of financial and economic security of a modern bank: remote maintenance risks“. Russian Journal of Management 5, Nr. 1 (04.04.2017): 62–70. http://dx.doi.org/10.12737/22427.
Der volle Inhalt der QuellePanda, Abhilash, und Andrew Bower. „Cyber security and the disaster resilience framework“. International Journal of Disaster Resilience in the Built Environment 11, Nr. 4 (20.04.2020): 507–18. http://dx.doi.org/10.1108/ijdrbe-07-2019-0046.
Der volle Inhalt der QuelleNikolopoulos, Dionysios, Avi Ostfeld, Elad Salomons und Christos Makropoulos. „Resilience Assessment of Water Quality Sensor Designs under Cyber-Physical Attacks“. Water 13, Nr. 5 (28.02.2021): 647. http://dx.doi.org/10.3390/w13050647.
Der volle Inhalt der QuelleLee, In. „Internet of Things (IoT) Cybersecurity: Literature Review and IoT Cyber Risk Management“. Future Internet 12, Nr. 9 (18.09.2020): 157. http://dx.doi.org/10.3390/fi12090157.
Der volle Inhalt der QuellePurnomo, Arif D., Charles Lim und Burman Noviansyah. „Threat Hunting Early Experiment through Event Correlation and Memory Forensic“. ACMIT Proceedings 6, Nr. 1 (06.07.2021): 56–63. http://dx.doi.org/10.33555/acmit.v6i1.98.
Der volle Inhalt der QuelleBaretić, Maja, und Nikola Protrka. „Healthcare Information Technology“. International Journal of E-Services and Mobile Applications 13, Nr. 4 (Oktober 2021): 77–87. http://dx.doi.org/10.4018/ijesma.2021100105.
Der volle Inhalt der QuelleVasilenko, M., O. Kozin, M. Kozina und V. Rachuk. „CYBER RISKS IN THE MUNICIPAL ECONOMY DURING THE PANDEMIC: DAMAGES AND THE STRUGGLE FOR CYBER SECURITY“. Municipal economy of cities 3, Nr. 156 (01.07.2020): 80–87. http://dx.doi.org/10.33042/2522-1809-2020-3-156-80-87.
Der volle Inhalt der QuelleKwon, YooJin, SangYoum Lee, Ralph King, Jong Lim und Huy Kim. „Behavior Analysis and Anomaly Detection for a Digital Substation on Cyber-Physical System“. Electronics 8, Nr. 3 (15.03.2019): 326. http://dx.doi.org/10.3390/electronics8030326.
Der volle Inhalt der QuelleChaturvedi, Manmohan, Abhishek Narain Singh, Manmohan Prasad Gupta und Jaijit Bhattacharya. „Analyses of issues of information security in Indian context“. Transforming Government: People, Process and Policy 8, Nr. 3 (12.08.2014): 374–97. http://dx.doi.org/10.1108/tg-07-2013-0019.
Der volle Inhalt der QuelleIakovakis, George, Constantinos-Giovanni Xarhoulacos, Konstantinos Giovas und Dimitris Gritzalis. „Analysis and Classification of Mitigation Tools against Cyberattacks in COVID-19 Era“. Security and Communication Networks 2021 (19.08.2021): 1–21. http://dx.doi.org/10.1155/2021/3187205.
Der volle Inhalt der QuelleArcuri, Maria Cristina, Lorenzo Gai, Federica Ielasi und Elisabetta Ventisette. „Cyber attacks on hospitality sector: stock market reaction“. Journal of Hospitality and Tourism Technology 11, Nr. 2 (25.06.2020): 277–90. http://dx.doi.org/10.1108/jhtt-05-2019-0080.
Der volle Inhalt der QuelleDzomira, Shewangu. „Electronic fraud (cyber fraud) risk in the banking industry Zimbabwe“. Risk Governance and Control: Financial Markets and Institutions 4, Nr. 2 (2014): 17–27. http://dx.doi.org/10.22495/rgcv4i2art2.
Der volle Inhalt der QuelleMoskovchenko, Valeriy, Mikhail Gudkov und Oleg Lauta. „Robotechnical System for Analyzing Cyber-Security of Information Communication Systems and Networks“. NBI Technologies, Nr. 2 (Februar 2018): 30–38. http://dx.doi.org/10.15688/nbit.jvolsu.2018.2.5.
Der volle Inhalt der QuelleHouston Jr., Clemith J., und Douglas C. Sicker. „Maturity and Process Capability Models and Their Use in Measuring Resilience in Critical Infrastructure Protection Sectors“. International Journal of Strategic Information Technology and Applications 5, Nr. 2 (April 2014): 44–63. http://dx.doi.org/10.4018/ijsita.2014040104.
Der volle Inhalt der QuelleSzczepankiewicz, Elżbieta. „Management of accounting information resources security in Polish entities – study results“. Zeszyty Teoretyczne Rachunkowości 2018, Nr. 97 (153) (10.05.2018): 115–39. http://dx.doi.org/10.5604/01.3001.0012.0379.
Der volle Inhalt der QuelleKoloveas, Paris, Thanasis Chantzios, Sofia Alevizopoulou, Spiros Skiadopoulos und Christos Tryfonopoulos . „inTIME: A Machine Learning-Based Framework for Gathering and Leveraging Web Data to Cyber-Threat Intelligence“. Electronics 10, Nr. 7 (30.03.2021): 818. http://dx.doi.org/10.3390/electronics10070818.
Der volle Inhalt der QuelleChen, Chia-Mei, Zheng-Xun Cai und Dan-Wei (Marian) Wen. „Designing and Evaluating an Automatic Forensic Model for Fast Response of Cross-Border E-Commerce Security Incidents“. Journal of Global Information Management 30, Nr. 2 (Juli 2022): 1–19. http://dx.doi.org/10.4018/jgim.20220301.oa5.
Der volle Inhalt der QuelleHatalis, Kostas, Chengbo Zhao, Parv Venkitasubramaniam, Larry Snyder, Shalinee Kishore und Rick S. Blum. „Modeling and Detection of Future Cyber-Enabled DSM Data Attacks“. Energies 13, Nr. 17 (21.08.2020): 4331. http://dx.doi.org/10.3390/en13174331.
Der volle Inhalt der QuelleWang, Yu Fei, Tao Zhang, Yuan Yuan Ma und Bo Zhang. „An Information Security Assessments Framework for Power Control Systems“. Advanced Materials Research 805-806 (September 2013): 980–84. http://dx.doi.org/10.4028/www.scientific.net/amr.805-806.980.
Der volle Inhalt der QuelleChaula, Job Asheri, und Godfrey Weston Luwemba. „Security Control Assessment of Supervisory Control and Data Acquisition for Power Utilities in Tanzania“. European Journal of Engineering Research and Science 5, Nr. 7 (13.07.2020): 785–89. http://dx.doi.org/10.24018/ejers.2020.5.7.1429.
Der volle Inhalt der QuelleТаха Насіф, Нух. „Using statistical traffic analysis to calculate the confidential means of information transmission“. Наука і техніка Повітряних Сил Збройних Сил України, Nr. 1(42,) (21.01.2021): 118–25. http://dx.doi.org/10.30748/nitps.2021.42.15.
Der volle Inhalt der QuelleRay, Argha, und Anjali Kaushik. „State transgression on electronic expression: is it for real?“ Information & Computer Security 25, Nr. 4 (09.10.2017): 382–401. http://dx.doi.org/10.1108/ics-03-2016-0024.
Der volle Inhalt der QuelleLi, Chengcheng. „Penetration Testing Curriculum Development in Practice“. Journal of Information Technology Education: Innovations in Practice 14 (2015): 085–99. http://dx.doi.org/10.28945/2189.
Der volle Inhalt der QuelleCh, Rupa, Thippa Reddy Gadekallu, Mustufa Haider Abidi und Abdulrahman Al-Ahmari. „Computational System to Classify Cyber Crime Offenses using Machine Learning“. Sustainability 12, Nr. 10 (16.05.2020): 4087. http://dx.doi.org/10.3390/su12104087.
Der volle Inhalt der QuelleOriola, Oluwafemi, Adesesan Barnabas Adeyemo, Maria Papadaki und Eduan Kotzé. „A collaborative approach for national cybersecurity incident management“. Information & Computer Security 29, Nr. 3 (28.06.2021): 457–84. http://dx.doi.org/10.1108/ics-02-2020-0027.
Der volle Inhalt der QuelleArutyunov, Valery V. „SCIENTOMETRIC INDICATORS FOR LEADERS IN THE SCIENTIFIC RESEARCH OF THE INFORMATION SECURITY“. RSUH/RGGU Bulletin. Series Information Science. Information Security. Mathematics, Nr. 2 (2020): 46–56. http://dx.doi.org/10.28995/2686-679x-2020-2-46-56.
Der volle Inhalt der QuelleRoy, Yanina, Olena Riabchun und Valeriy Yermoshin. „MATURITY MODEL OF CYBER SECURITY SYSTEM OPPORTUNITIES AT CRITICAL INFRASTRUCTURE FACILITIES OF THE ES-C2M2 ENERGY SECTOR“. Cybersecurity: Education, Science, Technique 2, Nr. 10 (2020): 67–74. http://dx.doi.org/10.28925/2663-4023.2020.10.6774.
Der volle Inhalt der QuelleBoschee, Pam. „Comments: Complexity of Cyber Crime Skyrockets“. Journal of Petroleum Technology 73, Nr. 06 (01.06.2021): 8. http://dx.doi.org/10.2118/0621-0008-jpt.
Der volle Inhalt der QuelleUkwandu, Elochukwu, Mohamed Amine Ben Farah, Hanan Hindy, David Brosset, Dimitris Kavallieros, Robert Atkinson, Christos Tachtatzis, Miroslav Bures, Ivan Andonovic und Xavier Bellekens. „A Review of Cyber-Ranges and Test-Beds: Current and Future Trends“. Sensors 20, Nr. 24 (13.12.2020): 7148. http://dx.doi.org/10.3390/s20247148.
Der volle Inhalt der QuelleVolovici, Rodica-Maria, Elena Mărginean und Ioan-Irinel Vişa. „Digital Risks. Case Study on Digitization Projects of the LBUS Library“. International Journal of Advanced Statistics and IT&C for Economics and Life Sciences 9, Nr. 1 (01.06.2019): 23–30. http://dx.doi.org/10.2478/ijasitels-2019-0003.
Der volle Inhalt der QuellePapamartzivanos, Dimitrios, Sofia Anna Menesidou, Panagiotis Gouvas und Thanassis Giannetsos. „A Perfect Match: Converging and Automating Privacy and Security Impact Assessment On-the-Fly“. Future Internet 13, Nr. 2 (27.01.2021): 30. http://dx.doi.org/10.3390/fi13020030.
Der volle Inhalt der QuelleRam, Jiwat, und Zeyang Zhang. „Belt and road initiative (BRI) supply chain risks: propositions and model development“. International Journal of Logistics Management 31, Nr. 4 (08.09.2020): 777–99. http://dx.doi.org/10.1108/ijlm-12-2019-0366.
Der volle Inhalt der QuelleAlashi, Shahad A., und Hanaa A. Aldahawi. „Cybersecurity Management for Virtual Private Network (VPN) Applications: A Proposed Framework for the Governance of their Use in the Kingdom of Saudi Arabia“. Journal of Information Security and Cybercrimes Research 3, Nr. 1 (20.12.2020): 31–57. http://dx.doi.org/10.26735/vsdj4585.
Der volle Inhalt der QuelleRyczyński, Jacek. „Human Factor as a Determinant of Reliability and Safety of Technical Systems“. Journal of KONBiN 49, Nr. 3 (01.10.2019): 195–220. http://dx.doi.org/10.2478/jok-2019-0056.
Der volle Inhalt der QuelleChen, Chih-Wei, Ching-Yi Lin, Chine-Hung Tung, Hsiung-Ming Liao, Jr-Jie Jang, Kun-Chi Lai, Meng-Ying Li und Yin-Ling Huang. „Employing GIS towards shaping a smart and sustainable future: a brief policy survey of global and Taiwan’s efforts“. Proceedings of the ICA 2 (10.07.2019): 1–8. http://dx.doi.org/10.5194/ica-proc-2-16-2019.
Der volle Inhalt der QuelleTorres, Diamantino, Carina Pimentel und Susana Duarte. „Shop floor management system in the context of smart manufacturing: a case study“. International Journal of Lean Six Sigma 11, Nr. 5 (13.11.2019): 837–62. http://dx.doi.org/10.1108/ijlss-12-2017-0151.
Der volle Inhalt der QuelleЗаярна, Інна Сергіївна. „ZOOM AS A TOOL OF WEB BASED TEACHING OF FOREIGN LANGUAGES TO STUDENTS OF HIGHER EDUCATION ESTABLISHMENTS IN UKRAINE“. Information Technologies and Learning Tools 83, Nr. 3 (25.06.2021): 152–63. http://dx.doi.org/10.33407/itlt.v83i3.4234.
Der volle Inhalt der Quelle