Journal articles on the topic 'Cyborg landscapes'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cyborg landscapes.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Lokman, Kees. "Cyborg landscapes: Choreographing resilient interactions between infrastructure, ecology, and society." Journal of Landscape Architecture 12, no. 1 (January 2, 2017): 60–73. http://dx.doi.org/10.1080/18626033.2017.1301289.
Full textPurnomo, Arif D., Charles Lim, and Burman Noviansyah. "Threat Hunting Early Experiment through Event Correlation and Memory Forensic." ACMIT Proceedings 6, no. 1 (July 6, 2021): 56–63. http://dx.doi.org/10.33555/acmit.v6i1.98.
Full textHeise, Ursula K. "The Android and the Animal." PMLA/Publications of the Modern Language Association of America 124, no. 2 (March 2009): 503–10. http://dx.doi.org/10.1632/pmla.2009.124.2.503.
Full textJimenez-Zepeda, Victor, Donna E. Reece, McCurdy R. Arleigh, Esther Masih-Khan, Eshetu G. Atenafu, Michael Sebag, Julie Stakiw, et al. "Real-World Outcomes with Bortezomib-Containing Regimens and Lenalidomide Plus Dexamethasone for the Treatment of Transplant Ineligible MM Patients: A Multi-Institutional Report from the National Myeloma Canada Research Network (MCRN) Database." Blood 132, Supplement 1 (November 29, 2018): 2008. http://dx.doi.org/10.1182/blood-2018-99-117363.
Full textRamsdale, Andrew, Stavros Shiaeles, and Nicholas Kolokotronis. "A Comparative Analysis of Cyber-Threat Intelligence Sources, Formats and Languages." Electronics 9, no. 5 (May 16, 2020): 824. http://dx.doi.org/10.3390/electronics9050824.
Full textAlhajjar, Elie, and Kevin Lee. "The U.S. Cyber Threat Landscape." European Conference on Cyber Warfare and Security 21, no. 1 (June 8, 2022): 18–24. http://dx.doi.org/10.34190/eccws.21.1.197.
Full textFurnell, Steven, and Samantha Dowling. "Cyber crime: a portrait of the landscape." Journal of Criminological Research, Policy and Practice 5, no. 1 (February 28, 2019): 13–26. http://dx.doi.org/10.1108/jcrpp-07-2018-0021.
Full textDeakin, Mark. "From The City Of Bits to E-Topia." International Journal of E-Adoption 6, no. 1 (January 2014): 16–33. http://dx.doi.org/10.4018/ijea.2014010102.
Full textKaloudi, Nektaria, and Jingyue Li. "The AI-Based Cyber Threat Landscape." ACM Computing Surveys 53, no. 1 (May 29, 2020): 1–34. http://dx.doi.org/10.1145/3372823.
Full textCivitarese, Giuseppe. "Do cyborgs dream? Post‐human landscapes in Shinya Tsukamoto’s Nightmare Detective (2006)." International Journal of Psychoanalysis 91, no. 4 (August 2010): 1005–16. http://dx.doi.org/10.1111/j.1745-8315.2010.00305.x.
Full textRahardi, Kunjana. "LANSKAP KONTEKS EKSTRALINGUISTIK VIRTUAL DALAM PRAGMATIK SIBER." Linguistik Indonesia 40, no. 1 (February 3, 2022): 39–48. http://dx.doi.org/10.26499/li.v40i1.287.
Full textMuhammad Riaz Shad. "Cyber Threat Landscape and Readiness Challenge of Pakistan." Strategic Studies 39, no. 1 (April 24, 2019): 1–19. http://dx.doi.org/10.53532/ss.039.01.00115.
Full textChatzis, Petros, and Eliana Stavrou. "Cyber-threat landscape of border control infrastructures." International Journal of Critical Infrastructure Protection 36 (March 2022): 100503. http://dx.doi.org/10.1016/j.ijcip.2021.100503.
Full textScheiber, Laura L., and Judson Byrd Finley. "Domestic campsites and cyber landscapes in the Rocky Mountains." Antiquity 84, no. 323 (March 1, 2010): 114–30. http://dx.doi.org/10.1017/s0003598x00099804.
Full textZajko, Mike. "Canada’s cyber security and the changing threat landscape." Critical Studies on Security 3, no. 2 (May 4, 2015): 147–61. http://dx.doi.org/10.1080/21624887.2015.1071165.
Full textSahrom Abu, Md, Siti Rahayu Selamat, Aswami Ariffin, and Robiah Yusof. "Cyber Threat Intelligence – Issue and Challenges." Indonesian Journal of Electrical Engineering and Computer Science 10, no. 1 (April 1, 2018): 371. http://dx.doi.org/10.11591/ijeecs.v10.i1.pp371-379.
Full textAli, Rashid. "Looking to the future of the cyber security landscape." Network Security 2021, no. 3 (March 2021): 8–10. http://dx.doi.org/10.1016/s1353-4858(21)00029-5.
Full textHoran, Cecelia, and Hossein Saiedian. "Cyber Crime Investigation: Landscape, Challenges, and Future Research Directions." Journal of Cybersecurity and Privacy 1, no. 4 (September 30, 2021): 580–96. http://dx.doi.org/10.3390/jcp1040029.
Full textChoo, Kim-Kwang Raymond. "The cyber threat landscape: Challenges and future research directions." Computers & Security 30, no. 8 (November 2011): 719–31. http://dx.doi.org/10.1016/j.cose.2011.08.004.
Full textBhangoo, Har Sandeep Kaur. "Book review: Ramnath Reghunadhan, 2022. Cyber Technological Paradigms and Threat Landscape in India." Millennial Asia 13, no. 3 (November 11, 2022): 532–35. http://dx.doi.org/10.1177/09763996221128209.
Full textSparke, Matthew. "Situated Cyborg Knowledge in Not so Borderless Online Global Education: Mapping the Geosocial Landscape of a MOOC." Geopolitics 22, no. 1 (July 11, 2016): 51–72. http://dx.doi.org/10.1080/14650045.2016.1204601.
Full textWang, Shi Ying, and Xiu Li Jia. "Effect of Landscape Architecture in the Campus Construction." Applied Mechanics and Materials 584-586 (July 2014): 717–20. http://dx.doi.org/10.4028/www.scientific.net/amm.584-586.717.
Full textDhirani, Lubna Luxmi, Eddie Armstrong, and Thomas Newe. "Industrial IoT, Cyber Threats, and Standards Landscape: Evaluation and Roadmap." Sensors 21, no. 11 (June 5, 2021): 3901. http://dx.doi.org/10.3390/s21113901.
Full textClair, Allison, and Jim Mandler. "Building relationships with the new media in a cyber landscape." Journal of Business Strategy 40, no. 6 (November 18, 2019): 49–54. http://dx.doi.org/10.1108/jbs-08-2019-0154.
Full textRodofile, Nicholas R., Kenneth Radke, and Ernest Foo. "Extending the cyber-attack landscape for SCADA-based critical infrastructure." International Journal of Critical Infrastructure Protection 25 (June 2019): 14–35. http://dx.doi.org/10.1016/j.ijcip.2019.01.002.
Full textLanzendorfer, Quinn E. "Information Sharing Challenges in Government Cybersecurity Organizations." International Journal of Cyber Research and Education 2, no. 1 (January 2020): 32–39. http://dx.doi.org/10.4018/ijcre.2020010103.
Full textMcIntosh, Jacqueline, Bruno Marques, Madeleine Palmer, and Verarisa Ujung. "The Outside In." Enquiry A Journal for Architectural Research 16, no. 1 (July 29, 2019): 1–14. http://dx.doi.org/10.17831/enq:arcc.v16i1.445.
Full textLambi, Amit, Rashmi Agarwal, and Sandeep Vijayaraghvan. "Cross-Domain Deterrence in the Cyber World." International Journal for Research in Applied Science and Engineering Technology 10, no. 9 (September 30, 2022): 387–91. http://dx.doi.org/10.22214/ijraset.2022.46645.
Full textMuhammad Shairoze Malik, Muhammad Shairoze Malik. "Cyber Security - Incident Response and Management." International Journal for Electronic Crime Investigation 3, no. 3 (September 6, 2019): 6. http://dx.doi.org/10.54692/ijeci.2019.030337.
Full textMuhammad Shairoze Malik, Muhammad Shairoze Malik. "Cyber Security - Incident Response and Management." International Journal for Electronic Crime Investigation 3, no. 3 (September 6, 2019): 6. http://dx.doi.org/10.54692/ijeci.2020.030337.
Full textLopatova, Natalia. "Cybersecurity as a driver of business growth." Science and Innovations 3, no. 217 (March 2021): 38–41. http://dx.doi.org/10.29235/1818-9857-2021-3-38-41.
Full textBoyko, Taras, and Mariya Ruda. "Cyber-physical system for assessing the impact of wind farms on environmental elements." Ukrainian Metrological Journal, no. 1 (March 31, 2021): 60–66. http://dx.doi.org/10.24027/2306-7039.1.2021.228245.
Full textMittel, Michael. "Navigating the cyber-insurance landscape to protect MSPs and their clients." Computer Fraud & Security 2020, no. 1 (January 2020): 12–14. http://dx.doi.org/10.1016/s1361-3723(20)30008-7.
Full textVogel, Elisabeth, Zoya Dyka, Dan Klann, and Peter Langendörfer. "Resilience in the Cyberworld: Definitions, Features and Models." Future Internet 13, no. 11 (November 19, 2021): 293. http://dx.doi.org/10.3390/fi13110293.
Full textRashid, Asma, Anum Yar Khan, and Syed Wasif Azim. "Cyber hegemony and information warfare: A case of Russia." Liberal Arts and Social Sciences International Journal (LASSIJ) 5, no. 1 (June 30, 2021): 648–66. http://dx.doi.org/10.47264/idea.lassij/5.1.42.
Full textEssien, Essien D. "Ethical Implications of the Techno-Social Dilemma in Contemporary Cyber-Security Phenomenon in Africa." International Journal of Information Communication Technologies and Human Development 10, no. 1 (January 2018): 17–30. http://dx.doi.org/10.4018/ijicthd.2018010102.
Full textButnaru, Denisa. "Exoskeletons, Rehabilitation and Bodily Capacities." Body & Society 27, no. 3 (July 21, 2021): 28–57. http://dx.doi.org/10.1177/1357034x211025600.
Full textBoyko, Taras, Mariia Ruda, Serhiy Stasevych, and Olha Chaplyk. "THE WIND TURBINE AND THE ENVIRONMENT INTERACTION MODEL." Measuring Equipment and Metrology 82, no. 4 (2021): 51–60. http://dx.doi.org/10.23939/istcmtm2021.04.051.
Full textRajaram, Priyanga, Mark Goh, and Jianying Zhou. "Guidelines for cyber risk management in shipboard operational technology systems." Journal of Physics: Conference Series 2311, no. 1 (July 1, 2022): 012002. http://dx.doi.org/10.1088/1742-6596/2311/1/012002.
Full textSreeja, T., Dr Manna Sheela Rani Chetty, and Sekhar Babu Boddu. "Detecting SQL Injection Using Correlative Log Analysis." International Journal of Engineering & Technology 7, no. 2.32 (May 31, 2018): 389. http://dx.doi.org/10.14419/ijet.v7i2.32.15720.
Full textEt.al, Sandhya Sukhabogi. "A Theoretical review on the importance of Threat Intelligence Sharing & The challenges intricated." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (April 11, 2021): 3950–56. http://dx.doi.org/10.17762/turcomat.v12i3.1684.
Full textSlack, Chelsey, and Neil Robinson. "Co-operation: A Key to NATOs Cyberspace Endeavour." European Foreign Affairs Review 24, Issue 2 (May 1, 2019): 154–66. http://dx.doi.org/10.54648/eerr2019010.
Full textDreibelbis, Rachel C., Jaclyn Martin, Michael D. Coovert, and David W. Dorsey. "The Looming Cybersecurity Crisis and What It Means for the Practice of Industrial and Organizational Psychology." Industrial and Organizational Psychology 11, no. 2 (June 2018): 346–65. http://dx.doi.org/10.1017/iop.2018.3.
Full textWilner, Alex S. "Cybersecurity and its discontents: Artificial intelligence, the Internet of Things, and digital misinformation." International Journal: Canada's Journal of Global Policy Analysis 73, no. 2 (June 2018): 308–16. http://dx.doi.org/10.1177/0020702018782496.
Full textSwart, Ignatius, Barry Irwin, and Marthie M. Grobler. "Adaptation of the JDL Model for Multi-Sensor National Cyber Security Data Fusion." International Journal of Cyber Warfare and Terrorism 6, no. 3 (July 2016): 17–30. http://dx.doi.org/10.4018/ijcwt.2016070102.
Full textSmyrlis, Michail, Iason Somarakis, George Spanoudakis, George Hatzivasilis, and Sotiris Ioannidis. "CYRA: A Model-Driven CYber Range Assurance Platform." Applied Sciences 11, no. 11 (June 2, 2021): 5165. http://dx.doi.org/10.3390/app11115165.
Full textSchmitz-Berndt, Sandra, and Mark Cole. "Towards an Efficient and Coherent Regulatory Framework on Cybersecurity in the EU: The Proposals for a NIS 2.0 Directive and a Cyber Resilience Act." Applied Cybersecurity & Internet Governance 1, no. 1 (December 8, 2022): 121–37. http://dx.doi.org/10.5604/01.3001.0016.1323.
Full textMANANTAN, MARK BRYAN. "The People’s Republic of China’s Cyber Coercion: Taiwan, Hong Kong, and the South China Sea." Issues & Studies 56, no. 03 (September 2020): 2040013. http://dx.doi.org/10.1142/s1013251120400135.
Full textKalogeraki, Eleni-Maria, Spyridon Papastergiou, Haralambos Mouratidis, and Nineta Polemi. "A Novel Risk Assessment Methodology for SCADA Maritime Logistics Environments." Applied Sciences 8, no. 9 (August 28, 2018): 1477. http://dx.doi.org/10.3390/app8091477.
Full textPăvălașcu, Narcis Sebastian, and Manuela Rozalia Gabor. "A Case Study on the Particularities and Sustainability of the Concepts of TQM, Quality Control, and Risk Management in the Corporate Insurance Industry: Loss and the Incidence of Catastrophic Risks." Proceedings 63, no. 1 (December 10, 2020): 3. http://dx.doi.org/10.3390/proceedings2020063003.
Full text