Journal articles on the topic 'Cyber security management tool'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cyber security management tool.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Štitilis, Darius, Irmantas Rotomskis, Marius Laurinaitis, Sergiy Nadvynychnyy, and Nadiya Khorunzhak. "National cyber security strategies: management, unification and assessment." Independent Journal of Management & Production 11, no. 9 (November 1, 2020): 2341. http://dx.doi.org/10.14807/ijmp.v11i9.1431.
Full textFakiha, Bandr. "Business Organization Security Strategies to Cyber Security Threats." International Journal of Safety and Security Engineering 11, no. 1 (February 28, 2021): 101–4. http://dx.doi.org/10.18280/ijsse.110111.
Full textСуворов, Александр, Aleksandr Suvorov, Мария Матанцева, Mariya Matanceva, Евгения Плотникова, and Evgeniya Plotnikova. "Cyber Insurance as a Way of Cyber Risks Management." Safety in Technosphere 7, no. 5 (November 19, 2019): 35–42. http://dx.doi.org/10.12737/article_5d8b1f1205ad35.02378913.
Full textSvilicic, Boris, Junzo Kamahara, Matthew Rooks, and Yoshiji Yano. "Maritime Cyber Risk Management: An Experimental Ship Assessment." Journal of Navigation 72, no. 5 (February 7, 2019): 1108–20. http://dx.doi.org/10.1017/s0373463318001157.
Full textKaragozlu, Damla. "Determination of cyber security ensuring behaviours of pre-service teachers." Cypriot Journal of Educational Sciences 15, no. 6 (December 31, 2020): 1698–706. http://dx.doi.org/10.18844/cjes.v15i6.5327.
Full textKachynskyi, A. B., and M. S. Stremetska. "Operational analytics as a data monitoring and event management tool of the cyber security management systems." Reports of the National Academy of Sciences of Ukraine, no. 1 (February 2021): 9–16. http://dx.doi.org/10.15407/dopovidi2021.01.009.
Full textRusso, Pietro, Alberto Caponi, Marco Leuti, and Giuseppe Bianchi. "A Web Platform for Integrated Vulnerability Assessment and Cyber Risk Management." Information 10, no. 7 (July 17, 2019): 242. http://dx.doi.org/10.3390/info10070242.
Full textAtoum, Issa, Ahmed Otoom, and Amer Abu Ali. "A holistic cyber security implementation framework." Information Management & Computer Security 22, no. 3 (July 8, 2014): 251–64. http://dx.doi.org/10.1108/imcs-02-2013-0014.
Full textPavlík, Lukáš, Ekaterina Chytilová, and Jarmila Zimmermannová. "Security Aspects of Healthcare Organization from the Perspective of Digitization of Facility Management." WSEAS TRANSACTIONS ON BUSINESS AND ECONOMICS 18 (January 25, 2021): 360–66. http://dx.doi.org/10.37394/23207.2021.18.36.
Full textComizio, V. Gerard, Behnam Dayanim, and Laura Bain. "Cybersecurity as a global concern in need of global solutions: an overview of financial regulatory developments in 2015." Journal of Investment Compliance 17, no. 1 (May 3, 2016): 101–11. http://dx.doi.org/10.1108/joic-01-2016-0003.
Full textRani, Nazatul Shima Abdul, K. Sarojani Krishnan, Khairul Azizan Suda, and Chahhoub Fatimazahra. "An Effective Model for Fraud Risk Management in Mitigating Telecommunication Fraud Incidences." Asia Proceedings of Social Sciences 8, no. 2 (June 11, 2021): 112–16. http://dx.doi.org/10.31580/apss.v8i2.1919.
Full textGonzález-Granadillo, Gustavo, Susana González-Zarzosa, and Rodrigo Diaz. "Security Information and Event Management (SIEM): Analysis, Trends, and Usage in Critical Infrastructures." Sensors 21, no. 14 (July 12, 2021): 4759. http://dx.doi.org/10.3390/s21144759.
Full textGonzalez-Granadillo, Gustavo, Sofia Anna Menesidou, Dimitrios Papamartzivanos, Ramon Romeu, Diana Navarro-Llobet, Caxton Okoh, Sokratis Nifakos, Christos Xenakis, and Emmanouil Panaousis. "Automated Cyber and Privacy Risk Management Toolkit." Sensors 21, no. 16 (August 15, 2021): 5493. http://dx.doi.org/10.3390/s21165493.
Full textШумилина, Ольга, Ирина Езангина, and Irina Ezangina. "Management of financial and economic security of a modern bank: remote maintenance risks." Russian Journal of Management 5, no. 1 (April 4, 2017): 62–70. http://dx.doi.org/10.12737/22427.
Full textPanda, Abhilash, and Andrew Bower. "Cyber security and the disaster resilience framework." International Journal of Disaster Resilience in the Built Environment 11, no. 4 (April 20, 2020): 507–18. http://dx.doi.org/10.1108/ijdrbe-07-2019-0046.
Full textNikolopoulos, Dionysios, Avi Ostfeld, Elad Salomons, and Christos Makropoulos. "Resilience Assessment of Water Quality Sensor Designs under Cyber-Physical Attacks." Water 13, no. 5 (February 28, 2021): 647. http://dx.doi.org/10.3390/w13050647.
Full textLee, In. "Internet of Things (IoT) Cybersecurity: Literature Review and IoT Cyber Risk Management." Future Internet 12, no. 9 (September 18, 2020): 157. http://dx.doi.org/10.3390/fi12090157.
Full textPurnomo, Arif D., Charles Lim, and Burman Noviansyah. "Threat Hunting Early Experiment through Event Correlation and Memory Forensic." ACMIT Proceedings 6, no. 1 (July 6, 2021): 56–63. http://dx.doi.org/10.33555/acmit.v6i1.98.
Full textBaretić, Maja, and Nikola Protrka. "Healthcare Information Technology." International Journal of E-Services and Mobile Applications 13, no. 4 (October 2021): 77–87. http://dx.doi.org/10.4018/ijesma.2021100105.
Full textVasilenko, M., O. Kozin, M. Kozina, and V. Rachuk. "CYBER RISKS IN THE MUNICIPAL ECONOMY DURING THE PANDEMIC: DAMAGES AND THE STRUGGLE FOR CYBER SECURITY." Municipal economy of cities 3, no. 156 (July 1, 2020): 80–87. http://dx.doi.org/10.33042/2522-1809-2020-3-156-80-87.
Full textKwon, YooJin, SangYoum Lee, Ralph King, Jong Lim, and Huy Kim. "Behavior Analysis and Anomaly Detection for a Digital Substation on Cyber-Physical System." Electronics 8, no. 3 (March 15, 2019): 326. http://dx.doi.org/10.3390/electronics8030326.
Full textChaturvedi, Manmohan, Abhishek Narain Singh, Manmohan Prasad Gupta, and Jaijit Bhattacharya. "Analyses of issues of information security in Indian context." Transforming Government: People, Process and Policy 8, no. 3 (August 12, 2014): 374–97. http://dx.doi.org/10.1108/tg-07-2013-0019.
Full textIakovakis, George, Constantinos-Giovanni Xarhoulacos, Konstantinos Giovas, and Dimitris Gritzalis. "Analysis and Classification of Mitigation Tools against Cyberattacks in COVID-19 Era." Security and Communication Networks 2021 (August 19, 2021): 1–21. http://dx.doi.org/10.1155/2021/3187205.
Full textArcuri, Maria Cristina, Lorenzo Gai, Federica Ielasi, and Elisabetta Ventisette. "Cyber attacks on hospitality sector: stock market reaction." Journal of Hospitality and Tourism Technology 11, no. 2 (June 25, 2020): 277–90. http://dx.doi.org/10.1108/jhtt-05-2019-0080.
Full textDzomira, Shewangu. "Electronic fraud (cyber fraud) risk in the banking industry Zimbabwe." Risk Governance and Control: Financial Markets and Institutions 4, no. 2 (2014): 17–27. http://dx.doi.org/10.22495/rgcv4i2art2.
Full textMoskovchenko, Valeriy, Mikhail Gudkov, and Oleg Lauta. "Robotechnical System for Analyzing Cyber-Security of Information Communication Systems and Networks." NBI Technologies, no. 2 (February 2018): 30–38. http://dx.doi.org/10.15688/nbit.jvolsu.2018.2.5.
Full textHouston Jr., Clemith J., and Douglas C. Sicker. "Maturity and Process Capability Models and Their Use in Measuring Resilience in Critical Infrastructure Protection Sectors." International Journal of Strategic Information Technology and Applications 5, no. 2 (April 2014): 44–63. http://dx.doi.org/10.4018/ijsita.2014040104.
Full textSzczepankiewicz, Elżbieta. "Management of accounting information resources security in Polish entities – study results." Zeszyty Teoretyczne Rachunkowości 2018, no. 97 (153) (May 10, 2018): 115–39. http://dx.doi.org/10.5604/01.3001.0012.0379.
Full textKoloveas, Paris, Thanasis Chantzios, Sofia Alevizopoulou, Spiros Skiadopoulos , and Christos Tryfonopoulos . "inTIME: A Machine Learning-Based Framework for Gathering and Leveraging Web Data to Cyber-Threat Intelligence." Electronics 10, no. 7 (March 30, 2021): 818. http://dx.doi.org/10.3390/electronics10070818.
Full textChen, Chia-Mei, Zheng-Xun Cai, and Dan-Wei (Marian) Wen. "Designing and Evaluating an Automatic Forensic Model for Fast Response of Cross-Border E-Commerce Security Incidents." Journal of Global Information Management 30, no. 2 (July 2022): 1–19. http://dx.doi.org/10.4018/jgim.20220301.oa5.
Full textHatalis, Kostas, Chengbo Zhao, Parv Venkitasubramaniam, Larry Snyder, Shalinee Kishore, and Rick S. Blum. "Modeling and Detection of Future Cyber-Enabled DSM Data Attacks." Energies 13, no. 17 (August 21, 2020): 4331. http://dx.doi.org/10.3390/en13174331.
Full textWang, Yu Fei, Tao Zhang, Yuan Yuan Ma, and Bo Zhang. "An Information Security Assessments Framework for Power Control Systems." Advanced Materials Research 805-806 (September 2013): 980–84. http://dx.doi.org/10.4028/www.scientific.net/amr.805-806.980.
Full textChaula, Job Asheri, and Godfrey Weston Luwemba. "Security Control Assessment of Supervisory Control and Data Acquisition for Power Utilities in Tanzania." European Journal of Engineering Research and Science 5, no. 7 (July 13, 2020): 785–89. http://dx.doi.org/10.24018/ejers.2020.5.7.1429.
Full textТаха Насіф, Нух. "Using statistical traffic analysis to calculate the confidential means of information transmission." Наука і техніка Повітряних Сил Збройних Сил України, no. 1(42,) (January 21, 2021): 118–25. http://dx.doi.org/10.30748/nitps.2021.42.15.
Full textRay, Argha, and Anjali Kaushik. "State transgression on electronic expression: is it for real?" Information & Computer Security 25, no. 4 (October 9, 2017): 382–401. http://dx.doi.org/10.1108/ics-03-2016-0024.
Full textLi, Chengcheng. "Penetration Testing Curriculum Development in Practice." Journal of Information Technology Education: Innovations in Practice 14 (2015): 085–99. http://dx.doi.org/10.28945/2189.
Full textCh, Rupa, Thippa Reddy Gadekallu, Mustufa Haider Abidi, and Abdulrahman Al-Ahmari. "Computational System to Classify Cyber Crime Offenses using Machine Learning." Sustainability 12, no. 10 (May 16, 2020): 4087. http://dx.doi.org/10.3390/su12104087.
Full textOriola, Oluwafemi, Adesesan Barnabas Adeyemo, Maria Papadaki, and Eduan Kotzé. "A collaborative approach for national cybersecurity incident management." Information & Computer Security 29, no. 3 (June 28, 2021): 457–84. http://dx.doi.org/10.1108/ics-02-2020-0027.
Full textArutyunov, Valery V. "SCIENTOMETRIC INDICATORS FOR LEADERS IN THE SCIENTIFIC RESEARCH OF THE INFORMATION SECURITY." RSUH/RGGU Bulletin. Series Information Science. Information Security. Mathematics, no. 2 (2020): 46–56. http://dx.doi.org/10.28995/2686-679x-2020-2-46-56.
Full textRoy, Yanina, Olena Riabchun, and Valeriy Yermoshin. "MATURITY MODEL OF CYBER SECURITY SYSTEM OPPORTUNITIES AT CRITICAL INFRASTRUCTURE FACILITIES OF THE ES-C2M2 ENERGY SECTOR." Cybersecurity: Education, Science, Technique 2, no. 10 (2020): 67–74. http://dx.doi.org/10.28925/2663-4023.2020.10.6774.
Full textBoschee, Pam. "Comments: Complexity of Cyber Crime Skyrockets." Journal of Petroleum Technology 73, no. 06 (June 1, 2021): 8. http://dx.doi.org/10.2118/0621-0008-jpt.
Full textUkwandu, Elochukwu, Mohamed Amine Ben Farah, Hanan Hindy, David Brosset, Dimitris Kavallieros, Robert Atkinson, Christos Tachtatzis, Miroslav Bures, Ivan Andonovic, and Xavier Bellekens. "A Review of Cyber-Ranges and Test-Beds: Current and Future Trends." Sensors 20, no. 24 (December 13, 2020): 7148. http://dx.doi.org/10.3390/s20247148.
Full textVolovici, Rodica-Maria, Elena Mărginean, and Ioan-Irinel Vişa. "Digital Risks. Case Study on Digitization Projects of the LBUS Library." International Journal of Advanced Statistics and IT&C for Economics and Life Sciences 9, no. 1 (June 1, 2019): 23–30. http://dx.doi.org/10.2478/ijasitels-2019-0003.
Full textPapamartzivanos, Dimitrios, Sofia Anna Menesidou, Panagiotis Gouvas, and Thanassis Giannetsos. "A Perfect Match: Converging and Automating Privacy and Security Impact Assessment On-the-Fly." Future Internet 13, no. 2 (January 27, 2021): 30. http://dx.doi.org/10.3390/fi13020030.
Full textRam, Jiwat, and Zeyang Zhang. "Belt and road initiative (BRI) supply chain risks: propositions and model development." International Journal of Logistics Management 31, no. 4 (September 8, 2020): 777–99. http://dx.doi.org/10.1108/ijlm-12-2019-0366.
Full textAlashi, Shahad A., and Hanaa A. Aldahawi. "Cybersecurity Management for Virtual Private Network (VPN) Applications: A Proposed Framework for the Governance of their Use in the Kingdom of Saudi Arabia." Journal of Information Security and Cybercrimes Research 3, no. 1 (December 20, 2020): 31–57. http://dx.doi.org/10.26735/vsdj4585.
Full textRyczyński, Jacek. "Human Factor as a Determinant of Reliability and Safety of Technical Systems." Journal of KONBiN 49, no. 3 (October 1, 2019): 195–220. http://dx.doi.org/10.2478/jok-2019-0056.
Full textChen, Chih-Wei, Ching-Yi Lin, Chine-Hung Tung, Hsiung-Ming Liao, Jr-Jie Jang, Kun-Chi Lai, Meng-Ying Li, and Yin-Ling Huang. "Employing GIS towards shaping a smart and sustainable future: a brief policy survey of global and Taiwan’s efforts." Proceedings of the ICA 2 (July 10, 2019): 1–8. http://dx.doi.org/10.5194/ica-proc-2-16-2019.
Full textTorres, Diamantino, Carina Pimentel, and Susana Duarte. "Shop floor management system in the context of smart manufacturing: a case study." International Journal of Lean Six Sigma 11, no. 5 (November 13, 2019): 837–62. http://dx.doi.org/10.1108/ijlss-12-2017-0151.
Full textЗаярна, Інна Сергіївна. "ZOOM AS A TOOL OF WEB BASED TEACHING OF FOREIGN LANGUAGES TO STUDENTS OF HIGHER EDUCATION ESTABLISHMENTS IN UKRAINE." Information Technologies and Learning Tools 83, no. 3 (June 25, 2021): 152–63. http://dx.doi.org/10.33407/itlt.v83i3.4234.
Full text