Academic literature on the topic 'Cyber-FIT'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cyber-FIT.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cyber-FIT"
Watkins, Laura E., Rosalita C. Maldonado, and David DiLillo. "The Cyber Aggression in Relationships Scale: A New Multidimensional Measure of Technology-Based Intimate Partner Aggression." Assessment 25, no. 5 (September 2, 2016): 608–26. http://dx.doi.org/10.1177/1073191116665696.
Full textNtingi, Nombeko, Petrus Duvenage, Jaco Du Toit, and Sebastian Von Solms. "Effective Cyber Threat Hunting: Where and how does it fit?" European Conference on Cyber Warfare and Security 21, no. 1 (June 8, 2022): 206–13. http://dx.doi.org/10.34190/eccws.21.1.240.
Full textYaokumah, Winfred. "Development and Psychometric Analysis of Cyber Ethics Instrument (CEI)." International Journal of Technoethics 12, no. 1 (January 2021): 54–74. http://dx.doi.org/10.4018/ijt.2021010104.
Full textEffendy, Faried, Eto Wuryanto, and Livia Felisia Marentina. "Penerapan Model Technology-to-Performance Chain pada Cyber Campus." Jurnal Edukasi dan Penelitian Informatika (JEPIN) 5, no. 2 (August 6, 2019): 176. http://dx.doi.org/10.26418/jp.v5i2.32684.
Full textYılmaz Bingöl, Tuğba. "Determining The Predictors of Self-Efficacy and Cyber Bullying." International Journal of Higher Education 7, no. 2 (March 23, 2018): 138. http://dx.doi.org/10.5430/ijhe.v7n2p138.
Full textNiki, O’Brien, Ghafur Saira, Sivaramakrishnan Arvind, and Durkin Mike. "Cyber-attacks are a permanent and substantial threat to health systems: Education must reflect that." DIGITAL HEALTH 8 (January 2022): 205520762211046. http://dx.doi.org/10.1177/20552076221104665.
Full textSlack, Chelsey, and Neil Robinson. "Co-operation: A Key to NATOs Cyberspace Endeavour." European Foreign Affairs Review 24, Issue 2 (May 1, 2019): 154–66. http://dx.doi.org/10.54648/eerr2019010.
Full textMohammadi, Fazel. "Emerging Challenges in Smart Grid Cybersecurity Enhancement: A Review." Energies 14, no. 5 (March 3, 2021): 1380. http://dx.doi.org/10.3390/en14051380.
Full textPinko, Eyal. "Maritime Cyber Threats and Challenges." National security and the future 20, no. 1-2 (January 9, 2020): 63–70. http://dx.doi.org/10.37458/nstf.20.1-2.7.
Full textLeslie, Nandi O., Richard E. Harang, Lawrence P. Knachel, and Alexander Kott. "Statistical models for the number of successful cyber intrusions." Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 15, no. 1 (June 30, 2017): 49–63. http://dx.doi.org/10.1177/1548512917715342.
Full textDissertations / Theses on the topic "Cyber-FIT"
(11023221), Fahad Salamh. "A 3-DIMENSIONAL UAS FORENSIC INTELLIGENCE-LED TAXONOMY (U-FIT)." Thesis, 2021.
Find full textBooks on the topic "Cyber-FIT"
Leiser, Mark, and Andrew Murray. The Role of Non-State Actors and Institutions in the Governance of New and Emerging Digital Technologies. Edited by Roger Brownsword, Eloise Scotford, and Karen Yeung. Oxford University Press, 2016. http://dx.doi.org/10.1093/oxfordhb/9780199680832.013.28.
Full textBook chapters on the topic "Cyber-FIT"
Dobson, Geoffrey B., and Kathleen M. Carley. "Cyber-FIT: An Agent-Based Modelling Approach to Simulating Cyber Warfare." In Social, Cultural, and Behavioral Modeling, 139–48. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-60240-0_18.
Full textBoothby, William H. "Where Do Cyber Hostilities Fit in the International Law Maze?" In New Technologies and the Law of Armed Conflict, 59–73. The Hague: T.M.C. Asser Press, 2013. http://dx.doi.org/10.1007/978-90-6704-933-7_5.
Full textHenschke, Adam. "Terrorism and the Internet of Things: Cyber-Terrorism as an Emergent Threat." In Advanced Sciences and Technologies for Security Applications, 71–87. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90221-6_5.
Full textLexa, Carsten. "Cyber Security." In Fit für die digitale Zukunft, 55–61. Wiesbaden: Springer Fachmedien Wiesbaden, 2021. http://dx.doi.org/10.1007/978-3-658-33073-6_14.
Full textMoore, Daniel. "Virtual Victory." In Offensive Cyber Operations, 101–16. Oxford University Press, 2022. http://dx.doi.org/10.1093/oso/9780197657553.003.0005.
Full textMoore, Daniel. "Principles of Cyber-Warfare." In Offensive Cyber Operations, 15–44. Oxford University Press, 2022. http://dx.doi.org/10.1093/oso/9780197657553.003.0002.
Full textArienmughare, Michael, Andrew S. Yoshimura, and Md Abdullah Al Momin. "Survey of Automotive Cyber-Physical System Security." In Security, Data Analytics, and Energy-Aware Solutions in the IoT, 78–97. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-7998-7323-5.ch005.
Full textCirullies, J., and Y. Pikus. "Fit für die Digitalisierung – Chatbots sichern Anwendern den Zugriff auf die Cyber-Ebene." In 27. Deutscher Materialfluss-Kongress, 215–22. VDI Verlag, 2018. http://dx.doi.org/10.51202/9783181023259-215.
Full textWeinstein, James. "Cyber Harassment and Free Speech." In Free Speech in the Digital Age, 52–73. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780190883591.003.0004.
Full textKharade, Sonali Sagar. "An Adverse Effect of Social, Gaming, and Entertainment Media on Overall Development of Adolescents." In Impact and Role of Digital Technologies in Adolescent Lives, 26–34. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-7998-8318-0.ch003.
Full textConference papers on the topic "Cyber-FIT"
Ghosh, Dipanjan D., Junghan Kim, Andrew Olewnik, Arun Lakshmanan, and Kemper E. Lewis. "Cyber-Empathic Design: A Data Driven Framework for Product Design." In ASME 2016 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2016. http://dx.doi.org/10.1115/detc2016-59642.
Full textIsaac Gabriel, Odun-Ayo. "A Review of Common Tools and Techniques for Reconnaissance Attacks.. Proceedings of the." In 28th iSTEAMS Multidisciplinary Research Conference AIUWA The Gambia. Society for Multidisciplinary and Advanced Research Techniques - Creative Research Publishers, 2021. http://dx.doi.org/10.22624/aims/isteams-2021/v28p11.
Full textHussain, Sayed Shahid, Khurram S. Khattak, Ali Khan, and Zawar H. Khan. "Cyber Physical System for Solar Energy Monitoring." In 2019 International Conference on Frontiers of Information Technology (FIT). IEEE, 2019. http://dx.doi.org/10.1109/fit47737.2019.00043.
Full textUsman, Awais, and Hamid Mukhtar. "Design Time Considedrations for Cyber Physical Systems." In 2012 10th International Conference on Frontiers of Information Technology (FIT 2012). IEEE, 2012. http://dx.doi.org/10.1109/fit.2012.56.
Full textRehman, Shafiq ur, Christopher Allgaier, and Volker Gruhn. "Security Requirements Engineering: A Framework for Cyber-Physical Systems." In 2018 International Conference on Frontiers of Information Technology (FIT). IEEE, 2018. http://dx.doi.org/10.1109/fit.2018.00062.
Full textIqbal, Zafar, Zahid Anwar, and Rafia Mumtaz. "STIXGEN - A Novel Framework for Automatic Generation of Structured Cyber Threat Information." In 2018 International Conference on Frontiers of Information Technology (FIT). IEEE, 2018. http://dx.doi.org/10.1109/fit.2018.00049.
Full textMohsin, Mujahid, and Zahid Anwar. "Where to Kill the Cyber Kill-Chain: An Ontology-Driven Framework for IoT Security Analytics." In 2016 International Conference on Frontiers of Information Technology (FIT). IEEE, 2016. http://dx.doi.org/10.1109/fit.2016.013.
Full textRiaz, Faisal, and Muaz A. Niazi. "Spectrum Mobility in Cognitive Radio-Based Vehicular Cyber Physical Networks: A Fuzzy Emotion-Inspired Scheme." In 2015 13th International Conference on Frontiers of Information Technology (FIT). IEEE, 2015. http://dx.doi.org/10.1109/fit.2015.53.
Full textKosasi, Sandy, Edy Victor, I. Dewa Ayu Eka Yuliani, Utin Kasma, Diana Fitriani, and Benedikta Bunyi. "Effects of IT Service Management on E-Learning Readiness through the HOT-Fit Model." In 2022 10th International Conference on Cyber and IT Service Management (CITSM). IEEE, 2022. http://dx.doi.org/10.1109/citsm56380.2022.9935923.
Full textLaudante, Elena, and Francesco Caputo. "Design and Digital Manufacturing: an ergonomic approach for Industry 4.0." In Systems & Design: Beyond Processes and Thinking. Valencia: Universitat Politècnica València, 2016. http://dx.doi.org/10.4995/ifdp.2016.3297.
Full text