Academic literature on the topic 'CyberSecurty'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'CyberSecurty.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "CyberSecurty"
Ham, Jeroen Van Der. "Toward a Better Understanding of “Cybersecurity”." Digital Threats: Research and Practice 2, no. 3 (July 2021): 1–3. http://dx.doi.org/10.1145/3442445.
Full textCalliess, Christian, and Ansgar Baumgarten. "Cybersecurity in the EU The Example of the Financial Sector: A Legal Perspective." German Law Journal 21, no. 6 (September 2020): 1149–79. http://dx.doi.org/10.1017/glj.2020.67.
Full textCampbell, Robert D. "Cybersecurity." ACM SIGCSE Bulletin 35, no. 2 (June 2003): 24–26. http://dx.doi.org/10.1145/782941.782965.
Full textBOHATY, ROCHELLE F. H. "CYBERSECURITY." Chemical & Engineering News 86, no. 44 (November 3, 2008): 18–20. http://dx.doi.org/10.1021/cen-v086n044.p018.
Full textPullin, Dennis W. "Cybersecurity." Frontiers of Health Services Management 35, no. 1 (2018): 3–12. http://dx.doi.org/10.1097/hap.0000000000000038.
Full textCACM Staff. "Cybersecurity." Communications of the ACM 60, no. 4 (March 24, 2017): 20–21. http://dx.doi.org/10.1145/3051455.
Full textMaurer, Chris, Kevin Kim, Dan Kim, and Leon A. Kappelman. "Cybersecurity." Communications of the ACM 64, no. 2 (January 25, 2021): 28–30. http://dx.doi.org/10.1145/3399667.
Full textRatnayake, Deepthi. "Cybersecurity." ITNOW 64, no. 1 (February 17, 2022): 37. http://dx.doi.org/10.1093/itnow/bwac019.
Full textRatnayake, Deepthi. "Cybersecurity." ITNOW 64, no. 2 (May 12, 2022): 49. http://dx.doi.org/10.1093/itnow/bwac056.
Full textTagarev, Todor. "Intelligence, Crime and Cybersecurity." Information & Security: An International Journal 31 (2014): 05–06. http://dx.doi.org/10.11610/isij.3100.
Full textDissertations / Theses on the topic "CyberSecurty"
Петрухно, Ігор Русланович. "Data Mining та машинні техніки навчання для виявлення вторгнення в кібербезпеку робототехнічних та автономних систем." Master's thesis, Київ, 2018. https://ela.kpi.ua/handle/123456789/26428.
Full textThe paper deals with the problem of cybersecurity associated with methods of analysis of large data sets for robotic systems. The object of this work is a research system based on the methodology of parallel computing using Hadoop tools. The subject is the methods and processes of Data Mining and machine learning techniques to detect the invasion of the cybersecurity of robotic and autonomous systems. In the given work, the main features of the existing system (SIEM) are considered. which allows processing large volumes of data, its advantages and disadvantages, Analysis of the tactics for constructing the Security Analitics System, which affect the accuracy, reliability, performance, scalability of project IDS systems. A research system implemented on the basis of parallel computing methodology using the Hadoop tools, which provides effective operation under attack conditions. This system can be used in the activities of a particular institution, and can also be used by other institutions to improve parallel computing using Hadoop tools, this concept can also be used as a methodological guide for the development of a system for detecting cybersecurity robotic and autonomous systems . Allows you to increase the speed of data processing and reduce the time of data analysis using the MapReduce paradigm. The size of the explanatory note is 111 sheets, contains 31 illustrations, 26 tables, 5 appendices.
Poluzzi, Lorenzo. "IA & Cybersecurity." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020.
Find full textHoward, David J. "Development of the Cybersecurity Attitudes Scale and Modeling Cybersecurity Behavior and its Antecedents." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7306.
Full textLingelbach, Kembley Kay. "Perceptions of Female Cybersecurity Professionals Toward Factors that Encourage Females to the Cybersecurity Field." Diss., NSUWorks, 2018. https://nsuworks.nova.edu/gscis_etd/1056.
Full textTagert, Adam C. "Cybersecurity Challenges in Developing Nations." Research Showcase @ CMU, 2010. http://repository.cmu.edu/dissertations/22.
Full textFalco, Gregory J. "Cybersecurity for urban critical infrastructure." Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/118226.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (pages 110-116).
Our cities are under attack. Urban critical infrastructure which includes the electric grid, water networks, transportation systems and public health and safety services are constantly being targeted by cyberattacks. Urban critical infrastructure has been increasingly connected to the internet for the purpose of operational convenience and efficiency as part of the growing Industrial Internet of Things (HoT). Unfortunately, when deciding to connect these systems, their cybersecurity was not taken seriously. A hacker can monitor, access and change these systems at their discretion because of the infrastructure's lack of security. This is not only a matter of potential inconvenience. Digital manipulation of these devices can have devastating physical consequences. This dissertation describes three steps cities should take to prepare for cyberattacks and defend themselves accordingly. First, cities must understand how an attacker might compromise its critical infrastructure. In the first chapter, I describe and demonstrate a methodology for enumerating attack vectors across a citys CCTV security system. The attack methodology uses established cybersecurity typologies to develop an attack ruleset for an Al planner that was programmed to perform attack generation. With this, cities can automatically determine all possible approaches hackers can take to compromise their critical infrastructure. Second, cities need to prioritize their cyber risks. There are hundreds of attack permutations for a given system and thousands for a city. In the second chapter, I develop a risk model for urban critical infrastructure. The model helps prioritize vulnerabilities that are frequently exploited for HoT Supervisory Control and Data Acquisition (SCADA) systems. Finally, cities need tools to defend themselves. In the third chapter, I present a nontechnical approach to defending against attacks called cyber negotiation. Cyber negotiation is one of several non-technical cyberdefense tools I call Defensive Social Engineering, where victims can use social engineering against the hacker. Cyber negotiation involves using a negotiation framework to defend against attacks with steps urban critical infrastructure operators can take before, during and after an attack. This study combines computer science and urban planning (Urban Science) to provide a starting point for cities to prepare for and protect themselves against cyberattacks.
by Gregory J. Falco.
Ph. D.
Pierce, Adam O. "Exploring the Cybersecurity Hiring Gap." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/3198.
Full textReid, Rayne. "Guidelines for cybersecurity education campaigns." Thesis, Nelson Mandela University, 2017. http://hdl.handle.net/10948/14091.
Full textNilsen, Richard. "Measuring Cybersecurity Competency: An Exploratory Investigation of the Cybersecurity Knowledge, Skills, and Abilities Necessary for Organizational Network Access Privileges." NSUWorks, 2017. http://nsuworks.nova.edu/gscis_etd/1017.
Full textTaiola, Matteo. "Cybersecurity in impianti dell'industria di processo." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021.
Find full textBooks on the topic "CyberSecurty"
Guiora, Amos N. Cybersecurity. Boca Raton, FL : Routledge, 2017.: Routledge, 2017. http://dx.doi.org/10.1201/9781315370231.
Full textBrooks, Charles J., Christopher Grow, Philip Craig, and Donald Short. Cybersecurity. Indianapolis, Indiana: John Wiley & Sons, Inc., 2018. http://dx.doi.org/10.1002/9781119369141.
Full textKumar, Gautam, Om Prakash Singh, and Hemraj Saini. Cybersecurity. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003145042.
Full textAbd El-Latif, Ahmed A., and Christos Volos, eds. Cybersecurity. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-92166-8.
Full textDonaldson, Scott E., Stanley G. Siegel, Chris K. Williams, and Abdul Aslam. Enterprise Cybersecurity. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4302-6083-7.
Full textConti, Mauro, Gaurav Somani, and Radha Poovendran, eds. Versatile Cybersecurity. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-97643-3.
Full textWaschke, Marvin. Personal Cybersecurity. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-2430-4.
Full textAyala, Luis. Cybersecurity Lexicon. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2068-9.
Full textBeissel, Stefan. Cybersecurity Investments. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30460-1.
Full textKaplan, James M., Tucker Bailey, Chris Rezek, Derek O'Halloran, and Alan Marcus, eds. Beyond Cybersecurity. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781119055228.
Full textBook chapters on the topic "CyberSecurty"
Wolfe, Jennifer C. "Cybersecurity." In Disruption in the Boardroom, 51–82. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6159-0_4.
Full textZaffar, Ehsan. "Cybersecurity." In Understanding Homeland Security, 399–439. Abingdon, Oxon; New York. NY: Routledge, 2019. |: Routledge, 2019. http://dx.doi.org/10.4324/9780323296243-8.
Full textJackson, Scott, and Ricardo Moraes dos Santos. "Cybersecurity." In Systems Approach to the Design of Commercial Aircraft, 57–60. First edition. | Boca Raton, FL : CRC Press, 2020.: CRC Press, 2020. http://dx.doi.org/10.1201/9781003053750-12.
Full textKulesza, Joanna. "Cybersecurity." In Encyclopedia of Big Data, 1–5. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-32001-4_53-1.
Full textRefsdal, Atle, Bjørnar Solhaug, and Ketil Stølen. "Cybersecurity." In Cyber-Risk Management, 29–32. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23570-7_4.
Full textRoy, Jeffrey. "Cybersecurity." In Public Administration and Information Technology, 59–68. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-7221-6_5.
Full textSiers, Rhea. "Cybersecurity." In Security Studies, 556–68. Third edition. | New York : Routledge, 2018. |: Routledge, 2018. http://dx.doi.org/10.4324/9781315228358-38.
Full textWichum, Ricky. "Cybersecurity." In Handbuch Virtualität, 1–13. Wiesbaden: Springer Fachmedien Wiesbaden, 2018. http://dx.doi.org/10.1007/978-3-658-16358-7_36-1.
Full textWichum, Ricky. "Cybersecurity." In Handbuch Virtualität, 669–80. Wiesbaden: Springer Fachmedien Wiesbaden, 2020. http://dx.doi.org/10.1007/978-3-658-16342-6_36.
Full textIslam, Md Shariful. "Cybersecurity." In Routledge Companion to Global Cyber-Security Strategy, 349–55. New York : Routledge, 2020.: Routledge, 2020. http://dx.doi.org/10.4324/9780429399718-29.
Full textConference papers on the topic "CyberSecurty"
Abdel-Fattah, Farhan, Fadel AlTamimi, and Khalid A. Farhan. "Machine Learning and Data Mining in Cybersecurty." In 2021 International Conference on Information Technology (ICIT). IEEE, 2021. http://dx.doi.org/10.1109/icit52682.2021.9491749.
Full textRossi, Paola, Itai Sela, Adam Rizika, Diogenes Angelidis, Mark Duck, and Ron Morrison. "Cyberdefence of Offshore Deepwater Drilling Rigs." In Offshore Technology Conference. OTC, 2021. http://dx.doi.org/10.4043/31235-ms.
Full textDlamini, Moses, Hein Venter, Jan Eloff, and Mariki Eloff. "Digital deception in cybersecurity: an information behaviour lens." In ISIC: the Information Behaviour Conference. University of Borås, Borås, Sweden, 2020. http://dx.doi.org/10.47989/irisic2018.
Full textKim, Euiyoung, Jieun Kwon, JungKyoon Yoon, and Alice M. Agogino. "Embedding Cybersecurity Into Design Education: Increasing Designers’ Awareness of Cybersecurity Throughout the Design Process." In ASME 2019 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2019. http://dx.doi.org/10.1115/detc2019-97720.
Full textEasttom, Chuck. "Applying Mathematics and Engineering Techniques to Cyber Security." In Congreso Internacional de Ingeniería de Sistemas. Universidad de Lima, 2021. http://dx.doi.org/10.26439/ciis2021.5575.
Full textChopra, Shubham, Hitesh Marwaha, and Anurag Sharma. "Cyber-Attacks Identification and Measures for Prevention." In International Conference on Cybersecurity and Cybercrime. Romanian Association for Information Security Assurance, 2022. http://dx.doi.org/10.19107/cybercon.2022.11.
Full textKemmerer, R. A. "Cybersecurity." In 25th International Conference on Software Engineering, 2003. Proceedings. IEEE, 2003. http://dx.doi.org/10.1109/icse.2003.1201257.
Full textMaymí, Fernando J. "Cybersecurity." In SIGITE '19: The 20th Annual Conference on Information Technology Education. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3349266.3355613.
Full textThapa, Bipun. "Sentiment Analysis of Cyber Security Content on Twitter and Reddit." In 3rd International Conference on Data Mining and Machine Learning (DMML 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.120708.
Full text"Cybersecurity, IT-aided Education, and TeLEs: Nexus, Vistas & Realities." In InSITE 2019: Informing Science + IT Education Conferences: Jerusalem. Informing Science Institute, 2019. http://dx.doi.org/10.28945/4153.
Full textReports on the topic "CyberSecurty"
Joo, Jhi Young, Emma Stewart, Benjamin Salazar, and Nathan Yee. Selection of Ten (10) Cybersecurity Scenarios For Project Cybersecure Interconnection of Distributed Energy Resources. Office of Scientific and Technical Information (OSTI), November 2018. http://dx.doi.org/10.2172/1498462.
Full textFlorakis, Chris, Christodoulos Louca, Roni Michaely, and Michael Weber. Cybersecurity Risk. Cambridge, MA: National Bureau of Economic Research, December 2020. http://dx.doi.org/10.3386/w28196.
Full textAlecu, Iulian, Costel Ciuchi, Toma Cimpeanu, Iulian Coman, Larisa Gabudeanu, Ioan-Cosmin Mihai, Cosmina Moghior, et al. Cybersecurity Guide. Romanian Association for Information Security Assurance, January 2021. http://dx.doi.org/10.19107/cybersec.2021.en.
Full textGuice, Leslie K. Cybersecurity Laboratory & Cybersecurity Research Program at the CRL. Fort Belvoir, VA: Defense Technical Information Center, August 2014. http://dx.doi.org/10.21236/ada608802.
Full textNewhouse, William, Stephanie Keith, Benjamin Scribner, and Greg Witte. National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework. Gaithersburg, MD: National Institute of Standards and Technology, August 2017. http://dx.doi.org/10.6028/nist.sp.800-181.
Full textNewhouse, William, Stephanie Keith, Benjamin Scribner, and Greg Witte. National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (Portuguese translation). National Institute of Standards and Technology, February 2022. http://dx.doi.org/10.6028/nist.sp.800-181pt.
Full textNewhouse, William, Stephanie Keith, Benjamin Scribner, and Greg Witte. National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (Spanish translation). National Institute of Standards and Technology, February 2022. http://dx.doi.org/10.6028/nist.sp.800-181es.
Full textNewhouse, Bill. National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (Ukrainian translation). National Institute of Standard and Technology, May 2022. http://dx.doi.org/10.6028/nist.sp.800-181.ukr.
Full textJohnson, Jay Tillay. PV Cybersecurity Final Report. Office of Scientific and Technical Information (OSTI), January 2019. http://dx.doi.org/10.2172/1491601.
Full textStouffer, Keith, Timothy Zimmerman, CheeYee Tang, Joshua Lubell, Jeffrey Cichonski, and John McCarthy. Cybersecurity framework manufacturing profile. Gaithersburg, MD: National Institute of Standards and Technology, September 2017. http://dx.doi.org/10.6028/nist.ir.8183.
Full text