Zeitschriftenartikel zum Thema „Cybersecurity frameworks“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Cybersecurity frameworks" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Taherdoost, Hamed. „Understanding Cybersecurity Frameworks and Information Security Standards—A Review and Comprehensive Overview“. Electronics 11, Nr. 14 (12.07.2022): 2181. http://dx.doi.org/10.3390/electronics11142181.
Der volle Inhalt der QuelleAlghamdi, Ahmed. „Comparative Analysis of ISO27001 and NIST CSF“. International Journal of Membrane Science and Technology 10, Nr. 4 (30.09.2023): 1423–29. http://dx.doi.org/10.15379/ijmst.v10i4.2258.
Der volle Inhalt der QuelleMelaku, Henock Mulugeta. „A Dynamic and Adaptive Cybersecurity Governance Framework“. Journal of Cybersecurity and Privacy 3, Nr. 3 (30.06.2023): 327–50. http://dx.doi.org/10.3390/jcp3030017.
Der volle Inhalt der QuelleLee, In. „Internet of Things (IoT) Cybersecurity: Literature Review and IoT Cyber Risk Management“. Future Internet 12, Nr. 9 (18.09.2020): 157. http://dx.doi.org/10.3390/fi12090157.
Der volle Inhalt der QuelleDedeke, Adenekan, und Katherine Masterson. „Contrasting cybersecurity implementation frameworks (CIF) from three countries“. Information & Computer Security 27, Nr. 3 (08.07.2019): 373–92. http://dx.doi.org/10.1108/ics-10-2018-0122.
Der volle Inhalt der QuelleMalatji, Masike, Annlizé L. Marnewick und Suné Von Solms. „Cybersecurity capabilities for critical infrastructure resilience“. Information & Computer Security 30, Nr. 2 (14.10.2021): 255–79. http://dx.doi.org/10.1108/ics-06-2021-0091.
Der volle Inhalt der QuelleMalatji, Masike, Annlizé L. Marnewick und Suné Von Solms. „Cybersecurity capabilities for critical infrastructure resilience“. Information & Computer Security 30, Nr. 2 (14.10.2021): 255–79. http://dx.doi.org/10.1108/ics-06-2021-0091.
Der volle Inhalt der QuelleMPHATHENI, Mandlenkosi Richard. „Cybersecurity: An Appraisal of Policy Frameworks and Related Conventions“. International Journal of Information Security and Cybercrime 12, Nr. 1 (28.06.2023): 45–60. http://dx.doi.org/10.19107/ijisc.2023.01.06.
Der volle Inhalt der QuelleAlSagri, Hatoon S., Shahab Saquib Sohail und Shiju Sebastian. „The role of deep reinforcement learning in developing adaptive cybersecurity defenses for smart grid systems“. Journal of Information and Optimization Sciences 45, Nr. 8 (2024): 2299–307. https://doi.org/10.47974/jios-1807.
Der volle Inhalt der QuelleShelly, Elizabeth. „Cybersecurity Frameworks for Cloud Computing Environments“. International Journal of Computing and Engineering 6, Nr. 1 (12.07.2024): 30–44. http://dx.doi.org/10.47941/ijce.2058.
Der volle Inhalt der QuelleAnkur Partap Kotwal. „Leveraging Big Data Analytics for Enhanced Cybersecurity: A Comprehensive Analysis of Threat Detection, Incident Response, and SIEM Systems“. International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, Nr. 6 (22.12.2024): 2158–64. https://doi.org/10.32628/cseit2410612414.
Der volle Inhalt der QuelleFolorunsho, O. S., A. Q. Ayinde, M. A. Olagoke und O. E. Fatoye. „Evaluating Cybersecurity Theories, Models, Standards and Frameworks“. Advances in Multidisciplinary and scientific Research Journal Publication 5, Nr. 4 (30.12.2019): 61–66. http://dx.doi.org/10.22624/aims/bhi/v5n4p7.
Der volle Inhalt der QuelleVon Solms, Sune. „The Identification of Cybersecurity Work Roles for the Water Sector in South Africa“. European Conference on Cyber Warfare and Security 22, Nr. 1 (19.06.2023): 510–16. http://dx.doi.org/10.34190/eccws.22.1.1109.
Der volle Inhalt der QuelleLawrence Damilare Oyeniyi, Chinonye Esther Ugochukwu und Noluthando Zamanjomane Mhlongo. „DEVELOPING CYBERSECURITY FRAMEWORKS FOR FINANCIAL INSTITUTIONS: A COMPREHENSIVE REVIEW AND BEST PRACTICES“. Computer Science & IT Research Journal 5, Nr. 4 (17.04.2024): 903–25. http://dx.doi.org/10.51594/csitrj.v5i4.1049.
Der volle Inhalt der QuelleTemitayo Oluwaseun Abrahams, Sarah Kuzankah Ewuga, Simon Kaggwa `, Prisca Ugomma Uwaoma `, Azeez Olanipekun Hassan und Samuel Onimisi Dawodu. „MASTERING COMPLIANCE: A COMPREHENSIVE REVIEW OF REGULATORY FRAMEWORKS IN ACCOUNTING AND CYBERSECURITY“. Computer Science & IT Research Journal 5, Nr. 1 (11.01.2024): 120–40. http://dx.doi.org/10.51594/csitrj.v5i1.709.
Der volle Inhalt der QuelleBabajide Tolulope Familoni und Philip Olaseni Shoetan. „CYBERSECURITY IN THE FINANCIAL SECTOR: A COMPARATIVE ANALYSIS OF THE USA AND NIGERIA“. Computer Science & IT Research Journal 5, Nr. 4 (17.04.2024): 850–77. http://dx.doi.org/10.51594/csitrj.v5i4.1046.
Der volle Inhalt der QuelleTurk, Žiga, Muammer Semih Sonkor und Robert Klinc. „CYBERSECURITY ASSESSMENT OF BIM/CDE DESIGN ENVIRONMENT USING CYBER ASSESSMENT FRAMEWORK“. JOURNAL OF CIVIL ENGINEERING AND MANAGEMENT 28, Nr. 5 (03.05.2022): 349–64. http://dx.doi.org/10.3846/jcem.2022.16682.
Der volle Inhalt der QuelleAbhilash Maroju, Srinivas A Vaddadi, Sravanthi Dontu, Rohith Vallabhaneni,. „An Empirical Paradigm on Cybersecurity Vulnerability Mitigation Framework“. International Journal on Recent and Innovation Trends in Computing and Communication 11, Nr. 9s (31.08.2023): 786–92. http://dx.doi.org/10.17762/ijritcc.v11i9s.9484.
Der volle Inhalt der QuelleFatai Adeshina Adelani, Enyinaya Stefano Okafor, Boma Sonimiteim Jacks und Olakunle Abayomi Ajala. „THEORETICAL FRAMEWORKS FOR THE ROLE OF AI AND MACHINE LEARNING IN WATER CYBERSECURITY: INSIGHTS FROM AFRICAN AND U.S. APPLICATIONS“. Computer Science & IT Research Journal 5, Nr. 3 (22.03.2024): 681–92. http://dx.doi.org/10.51594/csitrj.v5i3.928.
Der volle Inhalt der QuelleSharma, Monu. „Cybersecurity Platforms: Tackling Challenges in a Digital Age“. INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, Nr. 11 (23.11.2024): 1–9. http://dx.doi.org/10.55041/ijsrem12257.
Der volle Inhalt der QuelleHimanshu. „Cybersecurity Law: Challenges and Legal Frameworks for Protecting Digital Assets and Privacy Rights“. Indian Journal of Law 2, Nr. 2 (30.04.2024): 18–22. http://dx.doi.org/10.36676/ijl.v2.i2.05.
Der volle Inhalt der QuelleRahul Khanna. „Cybersecurity Law: Challenges and Legal Frameworks for Protecting Digital Assets and Privacy Rights“. Indian Journal of Law 2, Nr. 3 (01.07.2024): 15–20. http://dx.doi.org/10.36676/ijl.v2.i3.28.
Der volle Inhalt der QuelleMooghala, Sridhar. „An In - Depth Analysis of Cybersecurity Frameworks for Payment Applications“. International Journal of Science and Research (IJSR) 10, Nr. 8 (05.08.2021): 1250–54. http://dx.doi.org/10.21275/sr24304153706.
Der volle Inhalt der QuelleRahul Kumar Jha, Amit Patel und Birendra Kumar Shah. „Synergies and Challenges: Integrating Machine Learning, Blockchain Technology, and Regulatory Frameworks in Biomedical Cybersecurity“. Journal of ISMAC 5, Nr. 3 (September 2023): 237–56. http://dx.doi.org/10.36548/jismac.2023.3.004.
Der volle Inhalt der QuelleEmmanni, Phani Sekhar. „Federated Learning for Cybersecurity in Edge and Cloud Computing“. International Journal of Computing and Engineering 5, Nr. 4 (12.03.2024): 27–38. http://dx.doi.org/10.47941/ijce.1829.
Der volle Inhalt der QuelleWallis, Tania, und Paul Dorey. „Implementing Partnerships in Energy Supply Chain Cybersecurity Resilience“. Energies 16, Nr. 4 (14.02.2023): 1868. http://dx.doi.org/10.3390/en16041868.
Der volle Inhalt der QuelleIbitamuno, Pamela Victor. „Legal Frameworks for Cybersecurity in Nigeria - Adapting The Fourth Industrial Revolution“. Advances in Multidisciplinary and scientific Research Journal Publication 2, Nr. 1 (30.07.2023): 97–104. http://dx.doi.org/10.22624/aims/csean-smart2023p12.
Der volle Inhalt der QuelleRAJ, ANGIRA. „ASSESSING THE IMPLICATIONS OF CYBERSECURITY THREATS ON THE ADOPTION OF FINTECH SOLUTIONS“. INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, Nr. 05 (06.05.2024): 1–5. http://dx.doi.org/10.55041/ijsrem33381.
Der volle Inhalt der QuelleGoel, Rajni, Anupam Kumar und James Haddow. „PRISM: a strategic decision framework for cybersecurity risk assessment“. Information & Computer Security 28, Nr. 4 (19.06.2020): 591–625. http://dx.doi.org/10.1108/ics-11-2018-0131.
Der volle Inhalt der QuelleAlhejaili, Mohammad Omar Mohammad. „Securing the Kingdom’s e-commerce frontier: Evaluation of Saudi Arabia’s cybersecurity legal frameworks“. Journal of Governance and Regulation 13, Nr. 2, special issue (2024): 275–86. http://dx.doi.org/10.22495/jgrv13i2siart4.
Der volle Inhalt der QuelleEl-Hajj, Mohammed, und Zuhayr Aamir Mirza. „ProtectingSmall and Medium Enterprises: A Specialized Cybersecurity Risk Assessment Framework and Tool“. Electronics 13, Nr. 19 (02.10.2024): 3910. http://dx.doi.org/10.3390/electronics13193910.
Der volle Inhalt der QuelleNgozi Samuel Uzougbo, Chinonso Gladys Ikegwu und Adefolake Olachi Adewusi. „Cybersecurity compliance in financial institutions: A comparative analysis of global standards and regulations“. International Journal of Science and Research Archive 12, Nr. 1 (30.05.2024): 533–48. http://dx.doi.org/10.30574/ijsra.2024.12.1.0802.
Der volle Inhalt der QuelleShypovskyi, Volodymyr. „Decision-making process model for cybersecurity protection of critical infrastructure objects under the hybrid threats influence“. Journal of Scientific Papers "Social Development and Security" 13, Nr. 3 (30.06.2023): 43–55. http://dx.doi.org/10.33445/sds.2023.13.3.3.
Der volle Inhalt der QuelleVishal Kumar Seshagirirao Anil und Adeoluwa Bennard Babatope. „The role of data governance in enhancing cybersecurity resilience for global enterprises“. World Journal of Advanced Research and Reviews 24, Nr. 1 (30.10.2024): 1420–32. http://dx.doi.org/10.30574/wjarr.2024.24.1.3171.
Der volle Inhalt der QuelleAgyepong, Enoch. „The Need for Dynamic Cybersecurity“. ITNOW 66, Nr. 3 (2024): 16–17. http://dx.doi.org/10.1093/itnow/bwae079.
Der volle Inhalt der QuelleBoeding, Matthew, Kelly Boswell, Michael Hempel, Hamid Sharif, Juan Lopez und Kalyan Perumalla. „Survey of Cybersecurity Governance, Threats, and Countermeasures for the Power Grid“. Energies 15, Nr. 22 (19.11.2022): 8692. http://dx.doi.org/10.3390/en15228692.
Der volle Inhalt der QuelleNyamuchiwa, Kudakwashe, Zhen Lei und Clodualdo Aranas. „Cybersecurity Vulnerabilities in Off-Site Construction“. Applied Sciences 12, Nr. 10 (16.05.2022): 5037. http://dx.doi.org/10.3390/app12105037.
Der volle Inhalt der QuelleJonas, Dendy, Natasya Aprila Yusuf und Achani Rahmania Az Zahra. „Enhancing Security Frameworks with Artificial Intelligence in Cybersecurity“. International Transactions on Education Technology (ITEE) 2, Nr. 1 (15.11.2023): 83–91. http://dx.doi.org/10.33050/itee.v2i1.428.
Der volle Inhalt der QuelleAdebayo Omowunmi Temitope, LawalYusufAdedayo und Braimoh Kareem. „Cybersecurity risk management in agile development: protecting data and system“. International Journal of Science and Research Archive 8, Nr. 1 (28.02.2023): 988–94. http://dx.doi.org/10.30574/ijsra.2023.8.1.0188.
Der volle Inhalt der QuelleElendu, Chukwuka, Eunice K. Omeludike, Praise O. Oloyede, Babajide T. Obidigbo und Janet C. Omeludike. „Legal implications for clinicians in cybersecurity incidents: A review“. Medicine 103, Nr. 39 (27.09.2024): e39887. http://dx.doi.org/10.1097/md.0000000000039887.
Der volle Inhalt der QuelleChebib, Tom. „Digital Identity: A Human-Centered Risk Awareness Study“. Muma Business Review 5 (2021): 031–33. http://dx.doi.org/10.28945/4826.
Der volle Inhalt der QuelleMaphosa, Vusumuzi. „An overview of cybersecurity in Zimbabwe’s financial services sector“. F1000Research 12 (29.09.2023): 1251. http://dx.doi.org/10.12688/f1000research.132823.1.
Der volle Inhalt der QuelleMaphosa, Vusumuzi. „An overview of cybersecurity in Zimbabwe’s financial services sector“. F1000Research 12 (14.03.2024): 1251. http://dx.doi.org/10.12688/f1000research.132823.2.
Der volle Inhalt der QuelleHenry Nwapali Ndidi Naiho, Oluwabunmi Layode, Gbenga Sheriff Adeleke, Ezekiel Onyekachukwu Udeh und Talabi Temitope Labake. „Cybersecurity considerations in the implementation of innovative waste management technologies: "A critical review"“. Computer Science & IT Research Journal 5, Nr. 6 (14.06.2024): 1408–33. http://dx.doi.org/10.51594/csitrj.v5i6.1225.
Der volle Inhalt der QuelleFleming, Courtney, Mark Reith und Wayne Henry. „Securing Commercial Satellites for Military Operations: A Cybersecurity Supply Chain Framework“. International Conference on Cyber Warfare and Security 18, Nr. 1 (28.02.2023): 85–92. http://dx.doi.org/10.34190/iccws.18.1.1062.
Der volle Inhalt der QuelleKelvin Ovabor, Ismail Oluwatobiloba Sule-Odu, Travis Atkison, Adetutu Temitope Fabusoro und Joseph Oluwaseun Benedict. „AI-driven threat intelligence for real-time cybersecurity: Frameworks, tools, and future directions“. Open Access Research Journal of Science and Technology 12, Nr. 2 (30.11.2024): 040–48. http://dx.doi.org/10.53022/oarjst.2024.12.2.0135.
Der volle Inhalt der QuelleScott, Ben, und Raina Mason. „Cyber as a Second Language? A Challenge to Cybersecurity Education“. Journal of The Colloquium for Information Systems Security Education 9, Nr. 1 (08.03.2022): 6. http://dx.doi.org/10.53735/cisse.v9i1.137.
Der volle Inhalt der QuelleOluwatosin Abdul-Azeez, Alexsandra Ogadimma Ihechere und Courage Idemudia. „Digital access and inclusion for SMEs in the financial services industry through Cybersecurity GRC: A pathway to safer digital ecosystems“. Finance & Accounting Research Journal 6, Nr. 7 (07.07.2024): 1134–56. http://dx.doi.org/10.51594/farj.v6i7.1270.
Der volle Inhalt der QuelleBhajekar, Aryan, und Dr Subodhini Gupta. „CYBER SECURITY FOR POWER GRIDS: THREATS, MITIGATION, AND FUTURE OUTLOOK“. INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, Nr. 09 (23.09.2024): 1–4. http://dx.doi.org/10.55041/ijsrem37582.
Der volle Inhalt der QuelleSavchenko, V., A. Podolieva, O. Olkhovskyi, I. Halona und O. Aloshyn. „The Transformation of Legal Frameworks Through Secure Digitisation“. AFRICAN JOURNAL OF APPLIED RESEARCH 11, Nr. 1 (02.01.2025): 173–93. https://doi.org/10.26437/ajar.v11i1.835.
Der volle Inhalt der Quelle