Journal articles on the topic 'Cyber-FIT'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cyber-FIT.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Watkins, Laura E., Rosalita C. Maldonado, and David DiLillo. "The Cyber Aggression in Relationships Scale: A New Multidimensional Measure of Technology-Based Intimate Partner Aggression." Assessment 25, no. 5 (September 2, 2016): 608–26. http://dx.doi.org/10.1177/1073191116665696.
Full textNtingi, Nombeko, Petrus Duvenage, Jaco Du Toit, and Sebastian Von Solms. "Effective Cyber Threat Hunting: Where and how does it fit?" European Conference on Cyber Warfare and Security 21, no. 1 (June 8, 2022): 206–13. http://dx.doi.org/10.34190/eccws.21.1.240.
Full textYaokumah, Winfred. "Development and Psychometric Analysis of Cyber Ethics Instrument (CEI)." International Journal of Technoethics 12, no. 1 (January 2021): 54–74. http://dx.doi.org/10.4018/ijt.2021010104.
Full textEffendy, Faried, Eto Wuryanto, and Livia Felisia Marentina. "Penerapan Model Technology-to-Performance Chain pada Cyber Campus." Jurnal Edukasi dan Penelitian Informatika (JEPIN) 5, no. 2 (August 6, 2019): 176. http://dx.doi.org/10.26418/jp.v5i2.32684.
Full textYılmaz Bingöl, Tuğba. "Determining The Predictors of Self-Efficacy and Cyber Bullying." International Journal of Higher Education 7, no. 2 (March 23, 2018): 138. http://dx.doi.org/10.5430/ijhe.v7n2p138.
Full textNiki, O’Brien, Ghafur Saira, Sivaramakrishnan Arvind, and Durkin Mike. "Cyber-attacks are a permanent and substantial threat to health systems: Education must reflect that." DIGITAL HEALTH 8 (January 2022): 205520762211046. http://dx.doi.org/10.1177/20552076221104665.
Full textSlack, Chelsey, and Neil Robinson. "Co-operation: A Key to NATOs Cyberspace Endeavour." European Foreign Affairs Review 24, Issue 2 (May 1, 2019): 154–66. http://dx.doi.org/10.54648/eerr2019010.
Full textMohammadi, Fazel. "Emerging Challenges in Smart Grid Cybersecurity Enhancement: A Review." Energies 14, no. 5 (March 3, 2021): 1380. http://dx.doi.org/10.3390/en14051380.
Full textPinko, Eyal. "Maritime Cyber Threats and Challenges." National security and the future 20, no. 1-2 (January 9, 2020): 63–70. http://dx.doi.org/10.37458/nstf.20.1-2.7.
Full textLeslie, Nandi O., Richard E. Harang, Lawrence P. Knachel, and Alexander Kott. "Statistical models for the number of successful cyber intrusions." Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 15, no. 1 (June 30, 2017): 49–63. http://dx.doi.org/10.1177/1548512917715342.
Full textFarrell, Albert D., Erin L. Thompson, Krista R. Mehari, Terri N. Sullivan, and Elizabeth A. Goncy. "Assessment of In-Person and Cyber Aggression and Victimization, Substance Use, and Delinquent Behavior During Early Adolescence." Assessment 27, no. 6 (August 3, 2018): 1213–29. http://dx.doi.org/10.1177/1073191118792089.
Full textAlismaiel, Omar A. "Digital Media Used in Education: The Influence on Cyberbullying Behaviors among Youth Students." International Journal of Environmental Research and Public Health 20, no. 2 (January 12, 2023): 1370. http://dx.doi.org/10.3390/ijerph20021370.
Full textAderibigbe, Nurudeen, Dennis Ocholla, and Johannes Britz. "Differences in Ethical Cyber Behavioural Intention of Nigerian and South African Students: A Multi-Group Analysis Based on the Theory of Planned Behaviour." Libri 71, no. 4 (October 20, 2021): 389–406. http://dx.doi.org/10.1515/libri-2019-0062.
Full textLara, Laura. "Cyber dating abuse: Assessment, prevalence, and relationship with offline violence in young Chileans." Journal of Social and Personal Relationships 37, no. 5 (February 27, 2020): 1681–99. http://dx.doi.org/10.1177/0265407520907159.
Full textGörzig, Anke, Tijana Milosevic, and Elisabeth Staksrud. "Cyberbullying Victimization in Context: The Role of Social Inequalities in Countries and Regions." Journal of Cross-Cultural Psychology 48, no. 8 (August 18, 2017): 1198–215. http://dx.doi.org/10.1177/0022022116686186.
Full textBrants, Chrisje, Adam Jackson, and Tim J. Wilson. "A Comparative Analysis of Anglo-Dutch Approaches to ‘Cyber Policing’: Checks and Balances Fit for Purpose?" Journal of Criminal Law 84, no. 5 (October 2020): 451–73. http://dx.doi.org/10.1177/0022018320952561.
Full textRicaforte, Lhuillier B. "Social Media Exposure and Usage of Cyber Slang: Bases in Examining the Academic Writing Conventions of the Students." Shanti Journal 1, no. 1 (August 31, 2022): 229–54. http://dx.doi.org/10.3126/shantij.v1i1.47906.
Full textEichensehr, Kristen E. "Ukraine, Cyberattacks, and the Lessons for International Law." AJIL Unbound 116 (2022): 145–49. http://dx.doi.org/10.1017/aju.2022.20.
Full textSjursø, Ida Risanger, Hildegunn Fandrem, James O’Higgins Norman, and Erling Roland. "Teacher Authority in Long-Lasting Cases of Bullying: A Qualitative Study from Norway and Ireland." International Journal of Environmental Research and Public Health 16, no. 7 (March 31, 2019): 1163. http://dx.doi.org/10.3390/ijerph16071163.
Full textAgarwal, Nitin, Sean Andrist, Dan Bohus, Fei Fang, Laurie Fenstermacher, Lalana Kagal, Takashi Kido, et al. "Reports on the 2015 AAAI Spring Symposium Series." AI Magazine 36, no. 3 (September 28, 2015): 113–19. http://dx.doi.org/10.1609/aimag.v36i3.2608.
Full textLiu, Hongyu, and Bo Lang. "Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey." Applied Sciences 9, no. 20 (October 17, 2019): 4396. http://dx.doi.org/10.3390/app9204396.
Full textSohn, Hee-jeong. "Strange Passion: Gore Masculinity in the Digital Age." Sookmyung Research Institute of Humanities 12 (October 31, 2022): 57–83. http://dx.doi.org/10.37123/th.2022.12.57.
Full textMitra, Amit, and Nicholas O’Regan. "Creative Leadership Within the Cyber asset Market: An Interview With Dame Inga Beale." Journal of Management Inquiry 29, no. 1 (February 21, 2019): 51–58. http://dx.doi.org/10.1177/1056492619828837.
Full textMonedero, Íñigo, Julio Barbancho, Rafael Márquez, and Juan F. Beltrán. "Cyber-Physical System for Environmental Monitoring Based on Deep Learning." Sensors 21, no. 11 (May 24, 2021): 3655. http://dx.doi.org/10.3390/s21113655.
Full textArsene, Camelia Gabriela, and George Constantin. "Industry 4.0: Key Questions in Manufacturing." MATEC Web of Conferences 290 (2019): 02003. http://dx.doi.org/10.1051/matecconf/201929002003.
Full textBeggs, Christopher, and Ryan McGowan. "Fostering SCADA and IT Relationships." International Journal of Cyber Warfare and Terrorism 1, no. 3 (July 2011): 1–11. http://dx.doi.org/10.4018/ijcwt.2011070101.
Full textAlmoughem, Khaled. "The Future of Cybersecurity Workforce Development." Academic Journal of Research and Scientific Publishing 4, no. 45 (January 5, 2023): 37–48. http://dx.doi.org/10.52132/ajrsp.en.2023.45.3.
Full textLee, Jungup, Neil Abell, and Jennifer L. Holmes. "Validation of Measures of Cyberbullying Perpetration and Victimization in Emerging Adulthood." Research on Social Work Practice 27, no. 4 (March 31, 2015): 456–67. http://dx.doi.org/10.1177/1049731515578535.
Full textZhang, Xiaohui, Xianghua Miao, and Mingying Xue. "A Reputation-Based Approach Using Consortium Blockchain for Cyber Threat Intelligence Sharing." Security and Communication Networks 2022 (August 10, 2022): 1–20. http://dx.doi.org/10.1155/2022/7760509.
Full textHou, Fang. "Echoing Mechanism of Juvenile Delinquency Prevention and Occupational Therapy Education Guidance Based on Artificial Intelligence." Occupational Therapy International 2022 (September 29, 2022): 1–10. http://dx.doi.org/10.1155/2022/9115547.
Full textKrush, Dmytro, Christoph Cammin, Ralf Heynicke, Gerd Scholl, and Bernd Kaercher. "A wireless communication system for energy and environmental monitoring." Journal of Sensors and Sensor Systems 6, no. 1 (January 10, 2017): 19–26. http://dx.doi.org/10.5194/jsss-6-19-2017.
Full textLi, Xuelan, Xiao Li, and Jiyu Jiang. "Deep Intelligence-Driven Efficient Forecasting for the Agriculture Economy of Computational Social Systems." Computational Intelligence and Neuroscience 2022 (September 27, 2022): 1–12. http://dx.doi.org/10.1155/2022/2854675.
Full textKilovaty, Ido. "The Elephant in the Room: Coercion." AJIL Unbound 113 (2019): 87–91. http://dx.doi.org/10.1017/aju.2019.10.
Full textQuint, Fabian, Katharina Mura, and Dominic Gorecky. "In-Factory Learning – Qualification For The Factory Of The Future." ACTA Universitatis Cibiniensis 66, no. 1 (July 1, 2015): 159–64. http://dx.doi.org/10.1515/aucts-2015-0046.
Full textYerpude, Samir, and Tarun Kumar Singhal. "Value Enablement of Collaborative Supply Chain Environment Embedded With the Internet of Things." International Journal of Intelligent Information Technologies 16, no. 3 (July 2020): 19–51. http://dx.doi.org/10.4018/ijiit.2020070102.
Full textBanerjee, Shruti, Partha Sarathi Chakraborty, and . "Proposed approach to detect distributed denial of service attacks in software defined network using machine learning algorithms." International Journal of Engineering & Technology 7, no. 2.8 (March 19, 2018): 472. http://dx.doi.org/10.14419/ijet.v7i2.8.10488.
Full textAbdel-Basset, Mohamed, Reda Mohamed, Nazeeruddin Mohammad, Karam Sallam, and Nour Moustafa. "An Adaptive Cuckoo Search-Based Optimization Model for Addressing Cyber-Physical Security Problems." Mathematics 9, no. 10 (May 18, 2021): 1140. http://dx.doi.org/10.3390/math9101140.
Full textAlqahtani, Abdulrahman. "Towards a framework for the potential cyber-terrorist threat to critical national infrastructure." Information & Computer Security 23, no. 5 (November 9, 2015): 532–69. http://dx.doi.org/10.1108/ics-09-2014-0060.
Full textAgarwal, Arushi, Purushottam Sharma, Mohammed Alshehri, Ahmed A. Mohamed, and Osama Alfarraj. "Classification model for accuracy and intrusion detection using machine learning approach." PeerJ Computer Science 7 (April 7, 2021): e437. http://dx.doi.org/10.7717/peerj-cs.437.
Full textIkuabe, Matthew, Clinton Aigbavboa, Chimay Anumba, Ayodeji Oke, and Lerato Aghimien. "Confirmatory Factor Analysis of Performance Measurement Indicators Determining the Uptake of CPS for Facilities Management." Buildings 12, no. 4 (April 11, 2022): 466. http://dx.doi.org/10.3390/buildings12040466.
Full textRaimundo, Ricardo Jorge, and Albérico Travassos Rosário. "Cybersecurity in the Internet of Things in Industrial Management." Applied Sciences 12, no. 3 (February 2, 2022): 1598. http://dx.doi.org/10.3390/app12031598.
Full textToode, Ülle. "Charismatic Leaders in a New Perspective: Reality in Estonia and Italy." Studies in Media and Communication 8, no. 1 (March 2, 2020): 11. http://dx.doi.org/10.11114/smc.v8i1.4676.
Full textKhan, Zeeshan Ali, and Peter Herrmann. "Recent Advancements in Intrusion Detection Systems for the Internet of Things." Security and Communication Networks 2019 (July 3, 2019): 1–19. http://dx.doi.org/10.1155/2019/4301409.
Full textSemerci, Ali. "Investigating the effects of personality traits on cyberbullying." Pegem Eğitim ve Öğretim Dergisi 7, no. 2 (April 8, 2017): 211–30. http://dx.doi.org/10.14527/pegegog.2017.008.
Full textArsenijević, Jasmina, and Dejan Arsenijević. "Public relations in the digital era: New methods and tools." Univerzitetska misao - casopis za nauku, kulturu i umjetnost, Novi Pazar, no. 20 (2021): 54–65. http://dx.doi.org/10.5937/univmis2120054a.
Full textEricsson, Mikael, Dahniel Johansson, and David Stjern. "AI-Based Quality Control of Wood Surfaces with Autonomous Material Handling." Applied Sciences 11, no. 21 (October 25, 2021): 9965. http://dx.doi.org/10.3390/app11219965.
Full textRistić, Predrag, and Sanja Čelik. "Public relations in the digital era: New methods and tools." Univerzitetska misao - casopis za nauku, kulturu i umjetnost, Novi Pazar, no. 19 (2020): 74–85. http://dx.doi.org/10.5937/univmis2019074r.
Full textCao, Yuanlong, Ruiwen Ji, Lejun Ji, Mengshuang Bao, Lei Tao, and Wei Yang. "Can Multipath TCP Be Robust to Cyber Attacks? A Measuring Study of MPTCP with Active Queue Management Algorithms." Security and Communication Networks 2021 (May 27, 2021): 1–11. http://dx.doi.org/10.1155/2021/9963829.
Full textIliyasu, Auwal Sani, Usman Alhaji Abdurrahman, and Lirong Zheng. "Few-Shot Network Intrusion Detection Using Discriminative Representation Learning with Supervised Autoencoder." Applied Sciences 12, no. 5 (February 24, 2022): 2351. http://dx.doi.org/10.3390/app12052351.
Full textWambui, Boniface Mwangi, Joyce W. Gikandi, and Geoffrey Mariga Wambugu. "A Suvery of Biometric Authentication Technologies Towards Secure And Robust Systems: A Case Study of Mount Kenya University." Computer and Information Science 15, no. 2 (March 17, 2022): 43. http://dx.doi.org/10.5539/cis.v15n2p43.
Full text