Journal articles on the topic 'CyberSecurty'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'CyberSecurty.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Ham, Jeroen Van Der. "Toward a Better Understanding of “Cybersecurity”." Digital Threats: Research and Practice 2, no. 3 (July 2021): 1–3. http://dx.doi.org/10.1145/3442445.
Full textCalliess, Christian, and Ansgar Baumgarten. "Cybersecurity in the EU The Example of the Financial Sector: A Legal Perspective." German Law Journal 21, no. 6 (September 2020): 1149–79. http://dx.doi.org/10.1017/glj.2020.67.
Full textCampbell, Robert D. "Cybersecurity." ACM SIGCSE Bulletin 35, no. 2 (June 2003): 24–26. http://dx.doi.org/10.1145/782941.782965.
Full textBOHATY, ROCHELLE F. H. "CYBERSECURITY." Chemical & Engineering News 86, no. 44 (November 3, 2008): 18–20. http://dx.doi.org/10.1021/cen-v086n044.p018.
Full textPullin, Dennis W. "Cybersecurity." Frontiers of Health Services Management 35, no. 1 (2018): 3–12. http://dx.doi.org/10.1097/hap.0000000000000038.
Full textCACM Staff. "Cybersecurity." Communications of the ACM 60, no. 4 (March 24, 2017): 20–21. http://dx.doi.org/10.1145/3051455.
Full textMaurer, Chris, Kevin Kim, Dan Kim, and Leon A. Kappelman. "Cybersecurity." Communications of the ACM 64, no. 2 (January 25, 2021): 28–30. http://dx.doi.org/10.1145/3399667.
Full textRatnayake, Deepthi. "Cybersecurity." ITNOW 64, no. 1 (February 17, 2022): 37. http://dx.doi.org/10.1093/itnow/bwac019.
Full textRatnayake, Deepthi. "Cybersecurity." ITNOW 64, no. 2 (May 12, 2022): 49. http://dx.doi.org/10.1093/itnow/bwac056.
Full textTagarev, Todor. "Intelligence, Crime and Cybersecurity." Information & Security: An International Journal 31 (2014): 05–06. http://dx.doi.org/10.11610/isij.3100.
Full textBackman, Sarah. "Organising National Cybersecurity Centres." Information & Security: An International Journal 32 (2015): 9–26. http://dx.doi.org/10.11610/isij.3206.
Full textTasevski, Predrag. "Macedonian Path Towards Cybersecurity." Information & Security: An International Journal 32 (2015): 109–19. http://dx.doi.org/10.11610/isij.3204.
Full textCALATAYUD MARTÍ, PILAR, JULIAN ROMERO CHAVARRO, MARIO MONTAGUD AGUAR, LUCIA ARCOS USERO, MARTA GARCÍA PELLICER, and ALFREDO QUIJANO LÓPEZ. "THREE-LEVEL METHODOLOGY FOR SECURE AND EFFICIENT GRID INTEGRATION OF ELECTRIC VEHICLE." DYNA 96, no. 3 (May 1, 2021): 264–69. http://dx.doi.org/10.6036/10013.
Full textTsvilii, Olena. "Cybersecurity regulation: cybersecurity certification of operational technologies." Technology audit and production reserves 1, no. 2(57) (February 28, 2021): 54–60. http://dx.doi.org/10.15587/2706-5448.2021.225271.
Full textWang, Shouhong, and Hai Wang. "A Sociotechnical Systems Analysis of Knowledge Management for Cybersecurity." International Journal of Sociotechnology and Knowledge Development 13, no. 3 (July 2021): 77–94. http://dx.doi.org/10.4018/ijskd.2021070105.
Full textCraigen, Dan, Nadia Diakun-Thibault, and Randy Purse. "Defining Cybersecurity." Technology Innovation Management Review 4, no. 10 (October 30, 2014): 13–21. http://dx.doi.org/10.22215/timreview835.
Full textCraigen, Dan, Nadia Diakun-Thibault, and Randy Purse. "Defining Cybersecurity." Technology Innovation Management Review 4, no. 10 (October 30, 2014): 13–21. http://dx.doi.org/10.22215/timreview/835.
Full textOleinik, Margarita, and Tatyana Porubel. "Agroholdings cybersecurity." Proceedings of the Kuban State Agrarian University 1, no. 78 (2019): 33–41. http://dx.doi.org/10.21515/1999-1703-78-33-41.
Full textTalbot, Edward B., Deborah Frincke, and Matt Bishop. "Demythifying Cybersecurity." IEEE Security & Privacy Magazine 8, no. 3 (May 2010): 56–59. http://dx.doi.org/10.1109/msp.2010.95.
Full textKim, Lee. "Cybersecurity awareness." Nursing 47, no. 6 (June 2017): 65–67. http://dx.doi.org/10.1097/01.nurse.0000516242.05454.b4.
Full textRadziwill, Nicole M. "Cybersecurity Leadership." Quality Management Journal 25, no. 2 (April 3, 2018): 109. http://dx.doi.org/10.1080/10686967.2018.1436356.
Full textReagin, Michael J., and Michael V. Gentry. "Enterprise Cybersecurity." Frontiers of Health Services Management 35, no. 1 (2018): 13–22. http://dx.doi.org/10.1097/hap.0000000000000037.
Full textLukowiak, Marcin, Stanisław Radziszowski, James Vallino, and Christopher Wood. "Cybersecurity Education." ACM Transactions on Computing Education 14, no. 1 (March 2014): 1–20. http://dx.doi.org/10.1145/2538029.
Full textBaranchuk, Adrian, Bryce Alexander, Debra Campbell, Sohaib Haseeb, Damian Redfearn, Chris Simpson, and Ben Glover. "Pacemaker Cybersecurity." Circulation 138, no. 12 (September 18, 2018): 1272–73. http://dx.doi.org/10.1161/circulationaha.118.035261.
Full textKim, Lee. "Cybersecurity awareness." Nursing Management (Springhouse) 48, no. 4 (April 2017): 16–19. http://dx.doi.org/10.1097/01.numa.0000514066.30572.f3.
Full textKim, Lee. "Cybersecurity matters." Nursing Management (Springhouse) 49, no. 2 (February 2018): 16–22. http://dx.doi.org/10.1097/01.numa.0000529921.97762.be.
Full textKuhn, Rick. "Introduction: Cybersecurity." IT Professional 12, no. 4 (July 2010): 18–19. http://dx.doi.org/10.1109/mitp.2010.110.
Full textRatnayake, Deepthi. "Insight: Cybersecurity." ITNOW 63, no. 2 (June 1, 2021): 41. http://dx.doi.org/10.1093/itnow/bwab052.
Full textPOPESCU, Eugen F. "Complementary Cybersecurity." International Journal of Information Security and Cybercrime 9, no. 2 (December 30, 2020): 33–37. http://dx.doi.org/10.19107/ijisc.2020.02.05.
Full textRatnayake, Deepthi. "Insight: cybersecurity." ITNOW 63, no. 4 (December 1, 2021): 39. http://dx.doi.org/10.1093/itnow/bwab118.
Full textRatnayake, Deepthi. "Insight: Cybersecurity." ITNOW 63, no. 3 (August 16, 2021): 39. http://dx.doi.org/10.1093/itnow/bwab082.
Full textGritzalis, Dimitris A., Grammati Pantziou, and Rodrigo Román-Castro. "Sensors Cybersecurity." Sensors 21, no. 5 (March 4, 2021): 1762. http://dx.doi.org/10.3390/s21051762.
Full textMaconachy, W. V., and D. Kinsey. "Cybersecurity Education." Journal of The Colloquium for Information Systems Security Education 9, no. 1 (March 8, 2022): 4. http://dx.doi.org/10.53735/cisse.v9i1.138.
Full textBurley, Diana L., Jon Eisenberg, and Seymour E. Goodman. "Would cybersecurity professionalization help address the cybersecurity crisis?" Communications of the ACM 57, no. 2 (February 2014): 24–27. http://dx.doi.org/10.1145/2556936.
Full textLAGE SERRANO, OSCAR, and MARIA SAIZ SANTOS. "BLOCKCHAIN AND THE DECENTRALISATION OF THE CYBERSECURITY INDUSTRY." DYNA 96, no. 3 (May 1, 2021): 239. http://dx.doi.org/10.6036/10188.
Full textCheng, Eric C. K., and Tianchong Wang. "Institutional Strategies for Cybersecurity in Higher Education Institutions." Information 13, no. 4 (April 12, 2022): 192. http://dx.doi.org/10.3390/info13040192.
Full textAlammari, Abdullah, Osama Sohaib, and Sayed Younes. "Developing and evaluating cybersecurity competencies for students in computing programs." PeerJ Computer Science 8 (January 17, 2022): e827. http://dx.doi.org/10.7717/peerj-cs.827.
Full textShires, James. "Enacting Expertise: Ritual and Risk in Cybersecurity." Politics and Governance 6, no. 2 (June 11, 2018): 31–40. http://dx.doi.org/10.17645/pag.v6i2.1329.
Full textAnanda, Safrida, Ika Putranti, and Andi Dir. "ANALYSIS OF THE EU CYBERSECURITY ACT UNDER THE THEORY OF NEOLIBERAL INSTITUTIONALISM." Arena Hukum 15, no. 1 (April 28, 2022): 176–99. http://dx.doi.org/10.21776/ub.arenahukum.2022.01501.9.
Full textCoenraad, Merijke, Anthony Pellicone, Diane Jass Ketelhut, Michel Cukier, Jan Plane, and David Weintrop. "Experiencing Cybersecurity One Game at a Time: A Systematic Review of Cybersecurity Digital Games." Simulation & Gaming 51, no. 5 (June 19, 2020): 586–611. http://dx.doi.org/10.1177/1046878120933312.
Full textTsvilii, Olena. "SYSTEM OF CERTIFICATION OF CYBERSECURITY OF INFORMATION AND COMMUNICATIONS TECHNOLOGIES." Proceedings of the O.S. Popov ОNAT 1, no. 2 (December 31, 2020): 121–34. http://dx.doi.org/10.33243/2518-7139-2020-1-2-121-134.
Full textReeves, A., P. Delfabbro, and D. Calic. "Encouraging Employee Engagement With Cybersecurity: How to Tackle Cyber Fatigue." SAGE Open 11, no. 1 (January 2021): 215824402110000. http://dx.doi.org/10.1177/21582440211000049.
Full textMICHALSKI, Daniel. "System Approach to Coherent Cybersecurity Strategy." Safety & Defense 5, no. 1 (December 27, 2019): 31–36. http://dx.doi.org/10.37105/sd.39.
Full textCai, Cuihong. "Cybersecurity in the Chinese Context: Changing Concepts, Vital Interests, and Prospects for Cooperation." China Quarterly of International Strategic Studies 01, no. 03 (October 2015): 471–96. http://dx.doi.org/10.1142/s2377740015500189.
Full textNobles, Calvin. "The Cyber Talent Gap and Cybersecurity Professionalizing." International Journal of Hyperconnectivity and the Internet of Things 2, no. 1 (January 2018): 42–51. http://dx.doi.org/10.4018/ijhiot.2018010104.
Full textMakeri, Yakubu Ajiji. "The Effectiveness of Cybersecurity Compliance in a Corporate Organization in Nigeria." International Journal on Recent and Innovation Trends in Computing and Communication 7, no. 6 (June 11, 2019): 16–19. http://dx.doi.org/10.17762/ijritcc.v7i6.5312.
Full textStoianov, Nikolai, and Andrey Ivanov. "Public Key Generation Principles Impact Cybersecurity." Information & Security: An International Journal 47, no. 2 (2020): 249–60. http://dx.doi.org/10.11610/isij.4717.
Full textPotii, Oleksandr V., Oleksandr V. Korneyko, and Yrii I. Gorbenko. "Cybersecurity in Ukraine: Problems and Perspectives." Information & Security: An International Journal 32 (2015): 71–94. http://dx.doi.org/10.11610/isij.3201.
Full textMubarakova,, S. R., S. T. Amanzholova,, and R. K. Uskenbayeva,. "USING MACHINE LEARNING METHODS IN CYBERSECURITY." Eurasian Journal of Mathematical and Computer Applications 10, no. 1 (March 2022): 69–78. http://dx.doi.org/10.32523/2306-6172-2022-10-1-69-78.
Full textHaapamäki, Elina, and Jukka Sihvonen. "Cybersecurity in accounting research." Managerial Auditing Journal 34, no. 7 (July 1, 2019): 808–34. http://dx.doi.org/10.1108/maj-09-2018-2004.
Full text