Journal articles on the topic 'Cybersecurity frameworks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cybersecurity frameworks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Taherdoost, Hamed. "Understanding Cybersecurity Frameworks and Information Security Standards—A Review and Comprehensive Overview." Electronics 11, no. 14 (July 12, 2022): 2181. http://dx.doi.org/10.3390/electronics11142181.
Full textAlghamdi, Ahmed. "Comparative Analysis of ISO27001 and NIST CSF." International Journal of Membrane Science and Technology 10, no. 4 (September 30, 2023): 1423–29. http://dx.doi.org/10.15379/ijmst.v10i4.2258.
Full textMelaku, Henock Mulugeta. "A Dynamic and Adaptive Cybersecurity Governance Framework." Journal of Cybersecurity and Privacy 3, no. 3 (June 30, 2023): 327–50. http://dx.doi.org/10.3390/jcp3030017.
Full textLee, In. "Internet of Things (IoT) Cybersecurity: Literature Review and IoT Cyber Risk Management." Future Internet 12, no. 9 (September 18, 2020): 157. http://dx.doi.org/10.3390/fi12090157.
Full textDedeke, Adenekan, and Katherine Masterson. "Contrasting cybersecurity implementation frameworks (CIF) from three countries." Information & Computer Security 27, no. 3 (July 8, 2019): 373–92. http://dx.doi.org/10.1108/ics-10-2018-0122.
Full textMalatji, Masike, Annlizé L. Marnewick, and Suné Von Solms. "Cybersecurity capabilities for critical infrastructure resilience." Information & Computer Security 30, no. 2 (October 14, 2021): 255–79. http://dx.doi.org/10.1108/ics-06-2021-0091.
Full textMalatji, Masike, Annlizé L. Marnewick, and Suné Von Solms. "Cybersecurity capabilities for critical infrastructure resilience." Information & Computer Security 30, no. 2 (October 14, 2021): 255–79. http://dx.doi.org/10.1108/ics-06-2021-0091.
Full textMPHATHENI, Mandlenkosi Richard. "Cybersecurity: An Appraisal of Policy Frameworks and Related Conventions." International Journal of Information Security and Cybercrime 12, no. 1 (June 28, 2023): 45–60. http://dx.doi.org/10.19107/ijisc.2023.01.06.
Full textAlSagri, Hatoon S., Shahab Saquib Sohail, and Shiju Sebastian. "The role of deep reinforcement learning in developing adaptive cybersecurity defenses for smart grid systems." Journal of Information and Optimization Sciences 45, no. 8 (2024): 2299–307. https://doi.org/10.47974/jios-1807.
Full textShelly, Elizabeth. "Cybersecurity Frameworks for Cloud Computing Environments." International Journal of Computing and Engineering 6, no. 1 (July 12, 2024): 30–44. http://dx.doi.org/10.47941/ijce.2058.
Full textAnkur Partap Kotwal. "Leveraging Big Data Analytics for Enhanced Cybersecurity: A Comprehensive Analysis of Threat Detection, Incident Response, and SIEM Systems." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 6 (December 22, 2024): 2158–64. https://doi.org/10.32628/cseit2410612414.
Full textFolorunsho, O. S., A. Q. Ayinde, M. A. Olagoke, and O. E. Fatoye. "Evaluating Cybersecurity Theories, Models, Standards and Frameworks." Advances in Multidisciplinary and scientific Research Journal Publication 5, no. 4 (December 30, 2019): 61–66. http://dx.doi.org/10.22624/aims/bhi/v5n4p7.
Full textVon Solms, Sune. "The Identification of Cybersecurity Work Roles for the Water Sector in South Africa." European Conference on Cyber Warfare and Security 22, no. 1 (June 19, 2023): 510–16. http://dx.doi.org/10.34190/eccws.22.1.1109.
Full textLawrence Damilare Oyeniyi, Chinonye Esther Ugochukwu, and Noluthando Zamanjomane Mhlongo. "DEVELOPING CYBERSECURITY FRAMEWORKS FOR FINANCIAL INSTITUTIONS: A COMPREHENSIVE REVIEW AND BEST PRACTICES." Computer Science & IT Research Journal 5, no. 4 (April 17, 2024): 903–25. http://dx.doi.org/10.51594/csitrj.v5i4.1049.
Full textTemitayo Oluwaseun Abrahams, Sarah Kuzankah Ewuga, Simon Kaggwa `, Prisca Ugomma Uwaoma `, Azeez Olanipekun Hassan, and Samuel Onimisi Dawodu. "MASTERING COMPLIANCE: A COMPREHENSIVE REVIEW OF REGULATORY FRAMEWORKS IN ACCOUNTING AND CYBERSECURITY." Computer Science & IT Research Journal 5, no. 1 (January 11, 2024): 120–40. http://dx.doi.org/10.51594/csitrj.v5i1.709.
Full textBabajide Tolulope Familoni and Philip Olaseni Shoetan. "CYBERSECURITY IN THE FINANCIAL SECTOR: A COMPARATIVE ANALYSIS OF THE USA AND NIGERIA." Computer Science & IT Research Journal 5, no. 4 (April 17, 2024): 850–77. http://dx.doi.org/10.51594/csitrj.v5i4.1046.
Full textTurk, Žiga, Muammer Semih Sonkor, and Robert Klinc. "CYBERSECURITY ASSESSMENT OF BIM/CDE DESIGN ENVIRONMENT USING CYBER ASSESSMENT FRAMEWORK." JOURNAL OF CIVIL ENGINEERING AND MANAGEMENT 28, no. 5 (May 3, 2022): 349–64. http://dx.doi.org/10.3846/jcem.2022.16682.
Full textAbhilash Maroju, Srinivas A Vaddadi, Sravanthi Dontu, Rohith Vallabhaneni,. "An Empirical Paradigm on Cybersecurity Vulnerability Mitigation Framework." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9s (August 31, 2023): 786–92. http://dx.doi.org/10.17762/ijritcc.v11i9s.9484.
Full textFatai Adeshina Adelani, Enyinaya Stefano Okafor, Boma Sonimiteim Jacks, and Olakunle Abayomi Ajala. "THEORETICAL FRAMEWORKS FOR THE ROLE OF AI AND MACHINE LEARNING IN WATER CYBERSECURITY: INSIGHTS FROM AFRICAN AND U.S. APPLICATIONS." Computer Science & IT Research Journal 5, no. 3 (March 22, 2024): 681–92. http://dx.doi.org/10.51594/csitrj.v5i3.928.
Full textSharma, Monu. "Cybersecurity Platforms: Tackling Challenges in a Digital Age." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 11 (November 23, 2024): 1–9. http://dx.doi.org/10.55041/ijsrem12257.
Full textHimanshu. "Cybersecurity Law: Challenges and Legal Frameworks for Protecting Digital Assets and Privacy Rights." Indian Journal of Law 2, no. 2 (April 30, 2024): 18–22. http://dx.doi.org/10.36676/ijl.v2.i2.05.
Full textRahul Khanna. "Cybersecurity Law: Challenges and Legal Frameworks for Protecting Digital Assets and Privacy Rights." Indian Journal of Law 2, no. 3 (July 1, 2024): 15–20. http://dx.doi.org/10.36676/ijl.v2.i3.28.
Full textMooghala, Sridhar. "An In - Depth Analysis of Cybersecurity Frameworks for Payment Applications." International Journal of Science and Research (IJSR) 10, no. 8 (August 5, 2021): 1250–54. http://dx.doi.org/10.21275/sr24304153706.
Full textRahul Kumar Jha, Amit Patel, and Birendra Kumar Shah. "Synergies and Challenges: Integrating Machine Learning, Blockchain Technology, and Regulatory Frameworks in Biomedical Cybersecurity." Journal of ISMAC 5, no. 3 (September 2023): 237–56. http://dx.doi.org/10.36548/jismac.2023.3.004.
Full textEmmanni, Phani Sekhar. "Federated Learning for Cybersecurity in Edge and Cloud Computing." International Journal of Computing and Engineering 5, no. 4 (March 12, 2024): 27–38. http://dx.doi.org/10.47941/ijce.1829.
Full textWallis, Tania, and Paul Dorey. "Implementing Partnerships in Energy Supply Chain Cybersecurity Resilience." Energies 16, no. 4 (February 14, 2023): 1868. http://dx.doi.org/10.3390/en16041868.
Full textIbitamuno, Pamela Victor. "Legal Frameworks for Cybersecurity in Nigeria - Adapting The Fourth Industrial Revolution." Advances in Multidisciplinary and scientific Research Journal Publication 2, no. 1 (July 30, 2023): 97–104. http://dx.doi.org/10.22624/aims/csean-smart2023p12.
Full textRAJ, ANGIRA. "ASSESSING THE IMPLICATIONS OF CYBERSECURITY THREATS ON THE ADOPTION OF FINTECH SOLUTIONS." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (May 6, 2024): 1–5. http://dx.doi.org/10.55041/ijsrem33381.
Full textGoel, Rajni, Anupam Kumar, and James Haddow. "PRISM: a strategic decision framework for cybersecurity risk assessment." Information & Computer Security 28, no. 4 (June 19, 2020): 591–625. http://dx.doi.org/10.1108/ics-11-2018-0131.
Full textAlhejaili, Mohammad Omar Mohammad. "Securing the Kingdom’s e-commerce frontier: Evaluation of Saudi Arabia’s cybersecurity legal frameworks." Journal of Governance and Regulation 13, no. 2, special issue (2024): 275–86. http://dx.doi.org/10.22495/jgrv13i2siart4.
Full textEl-Hajj, Mohammed, and Zuhayr Aamir Mirza. "ProtectingSmall and Medium Enterprises: A Specialized Cybersecurity Risk Assessment Framework and Tool." Electronics 13, no. 19 (October 2, 2024): 3910. http://dx.doi.org/10.3390/electronics13193910.
Full textNgozi Samuel Uzougbo, Chinonso Gladys Ikegwu, and Adefolake Olachi Adewusi. "Cybersecurity compliance in financial institutions: A comparative analysis of global standards and regulations." International Journal of Science and Research Archive 12, no. 1 (May 30, 2024): 533–48. http://dx.doi.org/10.30574/ijsra.2024.12.1.0802.
Full textShypovskyi, Volodymyr. "Decision-making process model for cybersecurity protection of critical infrastructure objects under the hybrid threats influence." Journal of Scientific Papers "Social Development and Security" 13, no. 3 (June 30, 2023): 43–55. http://dx.doi.org/10.33445/sds.2023.13.3.3.
Full textVishal Kumar Seshagirirao Anil and Adeoluwa Bennard Babatope. "The role of data governance in enhancing cybersecurity resilience for global enterprises." World Journal of Advanced Research and Reviews 24, no. 1 (October 30, 2024): 1420–32. http://dx.doi.org/10.30574/wjarr.2024.24.1.3171.
Full textAgyepong, Enoch. "The Need for Dynamic Cybersecurity." ITNOW 66, no. 3 (2024): 16–17. http://dx.doi.org/10.1093/itnow/bwae079.
Full textBoeding, Matthew, Kelly Boswell, Michael Hempel, Hamid Sharif, Juan Lopez, and Kalyan Perumalla. "Survey of Cybersecurity Governance, Threats, and Countermeasures for the Power Grid." Energies 15, no. 22 (November 19, 2022): 8692. http://dx.doi.org/10.3390/en15228692.
Full textNyamuchiwa, Kudakwashe, Zhen Lei, and Clodualdo Aranas. "Cybersecurity Vulnerabilities in Off-Site Construction." Applied Sciences 12, no. 10 (May 16, 2022): 5037. http://dx.doi.org/10.3390/app12105037.
Full textJonas, Dendy, Natasya Aprila Yusuf, and Achani Rahmania Az Zahra. "Enhancing Security Frameworks with Artificial Intelligence in Cybersecurity." International Transactions on Education Technology (ITEE) 2, no. 1 (November 15, 2023): 83–91. http://dx.doi.org/10.33050/itee.v2i1.428.
Full textAdebayo Omowunmi Temitope, LawalYusufAdedayo, and Braimoh Kareem. "Cybersecurity risk management in agile development: protecting data and system." International Journal of Science and Research Archive 8, no. 1 (February 28, 2023): 988–94. http://dx.doi.org/10.30574/ijsra.2023.8.1.0188.
Full textElendu, Chukwuka, Eunice K. Omeludike, Praise O. Oloyede, Babajide T. Obidigbo, and Janet C. Omeludike. "Legal implications for clinicians in cybersecurity incidents: A review." Medicine 103, no. 39 (September 27, 2024): e39887. http://dx.doi.org/10.1097/md.0000000000039887.
Full textChebib, Tom. "Digital Identity: A Human-Centered Risk Awareness Study." Muma Business Review 5 (2021): 031–33. http://dx.doi.org/10.28945/4826.
Full textMaphosa, Vusumuzi. "An overview of cybersecurity in Zimbabwe’s financial services sector." F1000Research 12 (September 29, 2023): 1251. http://dx.doi.org/10.12688/f1000research.132823.1.
Full textMaphosa, Vusumuzi. "An overview of cybersecurity in Zimbabwe’s financial services sector." F1000Research 12 (March 14, 2024): 1251. http://dx.doi.org/10.12688/f1000research.132823.2.
Full textHenry Nwapali Ndidi Naiho, Oluwabunmi Layode, Gbenga Sheriff Adeleke, Ezekiel Onyekachukwu Udeh, and Talabi Temitope Labake. "Cybersecurity considerations in the implementation of innovative waste management technologies: "A critical review"." Computer Science & IT Research Journal 5, no. 6 (June 14, 2024): 1408–33. http://dx.doi.org/10.51594/csitrj.v5i6.1225.
Full textFleming, Courtney, Mark Reith, and Wayne Henry. "Securing Commercial Satellites for Military Operations: A Cybersecurity Supply Chain Framework." International Conference on Cyber Warfare and Security 18, no. 1 (February 28, 2023): 85–92. http://dx.doi.org/10.34190/iccws.18.1.1062.
Full textKelvin Ovabor, Ismail Oluwatobiloba Sule-Odu, Travis Atkison, Adetutu Temitope Fabusoro, and Joseph Oluwaseun Benedict. "AI-driven threat intelligence for real-time cybersecurity: Frameworks, tools, and future directions." Open Access Research Journal of Science and Technology 12, no. 2 (November 30, 2024): 040–48. http://dx.doi.org/10.53022/oarjst.2024.12.2.0135.
Full textScott, Ben, and Raina Mason. "Cyber as a Second Language? A Challenge to Cybersecurity Education." Journal of The Colloquium for Information Systems Security Education 9, no. 1 (March 8, 2022): 6. http://dx.doi.org/10.53735/cisse.v9i1.137.
Full textOluwatosin Abdul-Azeez, Alexsandra Ogadimma Ihechere, and Courage Idemudia. "Digital access and inclusion for SMEs in the financial services industry through Cybersecurity GRC: A pathway to safer digital ecosystems." Finance & Accounting Research Journal 6, no. 7 (July 7, 2024): 1134–56. http://dx.doi.org/10.51594/farj.v6i7.1270.
Full textBhajekar, Aryan, and Dr Subodhini Gupta. "CYBER SECURITY FOR POWER GRIDS: THREATS, MITIGATION, AND FUTURE OUTLOOK." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 09 (September 23, 2024): 1–4. http://dx.doi.org/10.55041/ijsrem37582.
Full textSavchenko, V., A. Podolieva, O. Olkhovskyi, I. Halona, and O. Aloshyn. "The Transformation of Legal Frameworks Through Secure Digitisation." AFRICAN JOURNAL OF APPLIED RESEARCH 11, no. 1 (January 2, 2025): 173–93. https://doi.org/10.26437/ajar.v11i1.835.
Full text