Articoli di riviste sul tema "Cybersecurity Maturity Model Certification"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Cybersecurity Maturity Model Certification".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Razikin, Khairur, e Agus Widodo. "General Cybersecurity Maturity Assessment Model: Best Practice to Achieve Payment Card Industry-Data Security Standard (PCI-DSS) Compliance". CommIT (Communication and Information Technology) Journal 15, n. 2 (31 agosto 2021): 91–104. http://dx.doi.org/10.21512/commit.v15i2.6931.
Testo completoColeman, Joe. "The DOD's CMMC 2.0: What Heat Treaters Need to Know". AM&P Technical Articles 182, n. 2 (1 marzo 2024): 37–39. http://dx.doi.org/10.31399/asm.amp.2024-02.p037.
Testo completoFleming, Courtney, Mark Reith e Wayne Henry. "Securing Commercial Satellites for Military Operations: A Cybersecurity Supply Chain Framework". International Conference on Cyber Warfare and Security 18, n. 1 (28 febbraio 2023): 85–92. http://dx.doi.org/10.34190/iccws.18.1.1062.
Testo completoLevy, Yair, e Ruti Gafni. "Towards the quantification of cybersecurity footprint for SMBs using the CMMC 2.0". Online Journal of Applied Knowledge Management 10, n. 1 (6 settembre 2022): 43–61. http://dx.doi.org/10.36965/ojakm.2022.10(1)43-61.
Testo completoTsvilii, Olena. "Cybersecurity regulation: cybersecurity certification of operational technologies". Technology audit and production reserves 1, n. 2(57) (28 febbraio 2021): 54–60. http://dx.doi.org/10.15587/2706-5448.2021.225271.
Testo completoTsvilii, Olena. "SYSTEM OF CERTIFICATION OF CYBERSECURITY OF INFORMATION AND COMMUNICATIONS TECHNOLOGIES". Proceedings of the O.S. Popov ОNAT 1, n. 2 (31 dicembre 2020): 121–34. http://dx.doi.org/10.33243/2518-7139-2020-1-2-121-134.
Testo completoKour, Ravdeep, Ramin Karim e Adithya Thaduri. "Cybersecurity for railways – A maturity model". Proceedings of the Institution of Mechanical Engineers, Part F: Journal of Rail and Rapid Transit 234, n. 10 (18 ottobre 2019): 1129–48. http://dx.doi.org/10.1177/0954409719881849.
Testo completoYigit Ozkan, Bilge, Sonny van Lingen e Marco Spruit. "The Cybersecurity Focus Area Maturity (CYSFAM) Model". Journal of Cybersecurity and Privacy 1, n. 1 (13 febbraio 2021): 119–39. http://dx.doi.org/10.3390/jcp1010007.
Testo completoKunsook, Kritiyaporn, Sotarat Thammaboosadee e Rojjalak Chuckpaiwong. "Sustainable Organic Farming Maturity Model". International Journal on Advanced Science, Engineering and Information Technology 14, n. 2 (23 aprile 2024): 706–16. http://dx.doi.org/10.18517/ijaseit.14.2.19504.
Testo completoMorales-Fernández, Rogelio, José Alfonso Brito-Rojas e Jaime Arturo Villaseñor Marcial. "CAPABILITY MATURITY MODEL INTEGRATION (CMMI)". Revista de Investigación en Tecnologías de la Información 2, n. 3 (giugno 2014): 15–20. http://dx.doi.org/10.36825/riti.02.03.003.
Testo completoAliyu, Aliyu, Leandros Maglaras, Ying He, Iryna Yevseyeva, Eerke Boiten, Allan Cook e Helge Janicke. "A Holistic Cybersecurity Maturity Assessment Framework for Higher Education Institutions in the United Kingdom". Applied Sciences 10, n. 10 (25 maggio 2020): 3660. http://dx.doi.org/10.3390/app10103660.
Testo completoPeliukh, O. I., M. V. Yesina e D. Yu Holubnychyi. "CERT-UA assessment based on the CSIRT ENISA Maturity Model". Radiotekhnika, n. 213 (16 giugno 2023): 41–48. http://dx.doi.org/10.30837/rt.2023.2.213.04.
Testo completoAbhilash Maroju, Srinivas A Vaddadi, Sravanthi Dontu, Rohith Vallabhaneni,. "An Empirical Paradigm on Cybersecurity Vulnerability Mitigation Framework". International Journal on Recent and Innovation Trends in Computing and Communication 11, n. 9s (31 agosto 2023): 786–92. http://dx.doi.org/10.17762/ijritcc.v11i9s.9484.
Testo completoRoy, Yanina, Olena Riabchun e Valeriy Yermoshin. "MATURITY MODEL OF CYBER SECURITY SYSTEM OPPORTUNITIES AT CRITICAL INFRASTRUCTURE FACILITIES OF THE ES-C2M2 ENERGY SECTOR". Cybersecurity: Education, Science, Technique 2, n. 10 (2020): 67–74. http://dx.doi.org/10.28925/2663-4023.2020.10.6774.
Testo completoNowrozy, Raza. "GPTs or Grim Position Threats? The Potential Impacts of Large Language Models on Non-Managerial Jobs and Certifications in Cybersecurity". Informatics 11, n. 3 (11 luglio 2024): 45. http://dx.doi.org/10.3390/informatics11030045.
Testo completoEstorilio, Carla C. A., e Lígia de Oliveira Franzosi Bessa. "Relationship between food industries maturity and quality certification". Independent Journal of Management & Production 11, n. 7 (1 dicembre 2020): 2827–48. http://dx.doi.org/10.14807/ijmp.v11i7.1201.
Testo completoAbdullahi Garba, Adamu, Aliyu Musa Bade, Muktar Yahuza e Ya’u Nuhu. "Cybersecurity capability maturity models review and application domain". International Journal of Engineering & Technology 9, n. 3 (2 settembre 2020): 779. http://dx.doi.org/10.14419/ijet.v9i3.30719.
Testo completoDomnik, Jan, e Alexander Holland. "On Data Leakage Prevention Maturity: Adapting the C2M2 Framework". Journal of Cybersecurity and Privacy 4, n. 2 (30 marzo 2024): 167–95. http://dx.doi.org/10.3390/jcp4020009.
Testo completoPigola, Angélica, e Priscila Rezende da Costa. "Dynamic Capabilities in Cybersecurity Intelligence: A Meta-Synthesis to Enhance Protection Against Cyber Threats". Communications of the Association for Information Systems 53, n. 1 (2023): 1099–135. http://dx.doi.org/10.17705/1cais.05347.
Testo completoVarona Taborda, María Alejandra. "Dynamic Cybersecurity Model based on ISO standards for Higher Education Institutions in Colombia". Ingeniería Solidaria 17, n. 3 (6 settembre 2021): 1–21. http://dx.doi.org/10.16925/2357-6014.2021.03.05.
Testo completoAlmomani, Iman, Mohanned Ahmed e Leandros Maglaras. "Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia". PeerJ Computer Science 7 (9 settembre 2021): e703. http://dx.doi.org/10.7717/peerj-cs.703.
Testo completoUraipan, Naris, Prasong Praneetpolgrang e Tharini Manisri. "Application of an Analytic Hierarchy Process to Select the Level of a Cyber Resilient Capability Maturity Model in Digital Supply Chain Systems". ECTI Transactions on Computer and Information Technology (ECTI-CIT) 15, n. 2 (27 aprile 2021): 198–207. http://dx.doi.org/10.37936/ecti-cit.2021152.240631.
Testo completoFerreira, Daniel Jorge, e Henrique São Mamede. "Predicting Cybersecurity Risk - A Methodology for Assessments". ARIS2 - Advanced Research on Information Systems Security 2, n. 2 (30 dicembre 2022): 50–63. http://dx.doi.org/10.56394/aris2.v2i2.23.
Testo completoMori, Shigeo, e Atsuhiro Goto. "Reviewing National Cybersecurity Strategies". Journal of Disaster Research 13, n. 5 (1 ottobre 2018): 957–66. http://dx.doi.org/10.20965/jdr.2018.p0957.
Testo completoScherz, Marco, Bernd Markus Zunk, Christian Steinmann e Helmuth Kreiner. "How to Assess Sustainable Planning Processes of Buildings? A Maturity Assessment Model Approach for Designers". Sustainability 14, n. 5 (1 marzo 2022): 2879. http://dx.doi.org/10.3390/su14052879.
Testo completoHochstetter-Diez, Jorge, Mauricio Diéguez-Rebolledo, Julio Fenner-López e Cristina Cachero. "AIM Triad: A Prioritization Strategy for Public Institutions to Improve Information Security Maturity". Applied Sciences 13, n. 14 (19 luglio 2023): 8339. http://dx.doi.org/10.3390/app13148339.
Testo completoRosak-Szyrocka, Joanna, e Marek Roszak. "The role of the EFQM model in precepting quality in Polish enterprises". Multidisciplinary Aspects of Production Engineering 2, n. 1 (1 settembre 2019): 399–406. http://dx.doi.org/10.2478/mape-2019-0040.
Testo completoTavares de Aquino, Andre, e Renata Maciel de Melo. "Multicriteria model for selecting TQM consultancy and certification services". Benchmarking: An International Journal 23, n. 7 (3 ottobre 2016): 1736–50. http://dx.doi.org/10.1108/bij-05-2015-0049.
Testo completoKhan, T. U. R., P. Davis e F. J. Behr. "A FRAMEWORK FOR AN OPEN SOURCE GEOSPATIAL CERTIFICATION MODEL". ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLI-B6 (17 giugno 2016): 57–64. http://dx.doi.org/10.5194/isprs-archives-xli-b6-57-2016.
Testo completoMaingak, Akmal Zaifullah, Candiwan Candiwan e Listyo Dwi Harsono. "Information Security Assessment Using ISO/IEC 27001:2013 Standard on Government Institution". TRIKONOMIKA 17, n. 1 (17 settembre 2018): 28. http://dx.doi.org/10.23969/trikonomika.v17i1.1138.
Testo completoBotha-Badenhorst, Danielle, André Martin McDonald, Graham David Barbour, Ethan Buckinjohn e Wian Gertenbach. "On The Zero-Trust Intranet Certification Problem". International Conference on Cyber Warfare and Security 19, n. 1 (21 marzo 2024): 10–18. http://dx.doi.org/10.34190/iccws.19.1.2054.
Testo completoRibeiro, Renata Maciel, Sergio Ricardo Barros, Julio Cesar Wasserman e Barbara Franz. "DIAGNOSIS FOR THE IMPLEMENTATION OF AN ENVIRONMENTAL MANAGEMENT SYSTEM IN A MICROBUSINESS IN THE URBAN VECTOR AND PEST CONTROL SECTOR". Brazilian Journal of Operations & Production Management 13, n. 1 (20 marzo 2016): 32. http://dx.doi.org/10.14488/bjopm.2016.v13.n1.a3.
Testo completoTabim, Verônica Maurer, Cíntia Wilke Franco e João Pedro Hoerde. "Digital transformation in e-commerce logistics". Brazilian Journal of Operations & Production Management 21, n. 1 (2 marzo 2024): 1641. http://dx.doi.org/10.14488/bjopm.1641.2024.
Testo completoPark, Na-Eun, So-Hyun Park, Ye-Sol Oh, Jung-Hyun Moon e Il-Gu Lee. "Distributed Authentication Model for Secure Network Connectivity in Network Separation Technology". Sensors 22, n. 2 (12 gennaio 2022): 579. http://dx.doi.org/10.3390/s22020579.
Testo completoAmanda, Delpia, Nurul Mutiah e Syahru Rahmayudha. "Analisis Tingkat Kematangan Keamanan Informasi Menggunakan NIST Cybersecurity Framework dan CMMI". Coding Jurnal Komputer dan Aplikasi 11, n. 2 (1 settembre 2023): 291. http://dx.doi.org/10.26418/coding.v11i2.65088.
Testo completoTaranukha, S. N., A. A. Kuzmin e M. N. Saveleva. "Qualimetric model of maturity of competencies for graduates of basic educational programs". Informatics and education, n. 5 (4 luglio 2020): 24–32. http://dx.doi.org/10.32517/0234-0453-2020-35-5-24-32.
Testo completoFajri, Khafidh Sunny Al, e Ruki Harwahyu. "Information Security Management System Assessment Model by Integrating ISO 27002 and 27004". MALCOM: Indonesian Journal of Machine Learning and Computer Science 4, n. 2 (24 febbraio 2024): 498–506. http://dx.doi.org/10.57152/malcom.v4i2.1245.
Testo completoLisboa Malaquias, Felipe, Georgios Giantamidis, Stylianos Basagiannis, Simone Fulvio Rollini e Isaac Amundson. "Towards a Methodology to Design Provably Secure Cyber-physical Systems". ACM SIGAda Ada Letters 43, n. 1 (30 ottobre 2023): 94–99. http://dx.doi.org/10.1145/3631483.3631499.
Testo completoDunn, Paul, e Barbara Sainty. "Professionalism in accounting: a five-factor model of ethical decision-making". Social Responsibility Journal 16, n. 2 (11 gennaio 2019): 255–69. http://dx.doi.org/10.1108/srj-11-2017-0240.
Testo completoKvint, V. L., A. V. Babkin e E. V. Shkarupeta. "Strategizing of forming a platform operating model to increase the level of digital maturity of industrial systems". Russian Journal of Industrial Economics 15, n. 3 (8 ottobre 2022): 249–61. http://dx.doi.org/10.17073/2072-1633-2022-3-249-261.
Testo completoPereira, Soraia, Lara Silva, José Machado e Alexandra Cabral. "The Clinical Informatization in Portugal". International Journal of Reliable and Quality E-Healthcare 9, n. 2 (aprile 2020): 34–47. http://dx.doi.org/10.4018/ijrqeh.2020040103.
Testo completoWella, Wella, e Laurentia Chia. "The Implementing ISO 9001 In Manufacture Industry". IJNMT (International Journal of New Media Technology) 6, n. 2 (16 gennaio 2020): 92–97. http://dx.doi.org/10.31937/ijnmt.v6i2.1248.
Testo completoKayisoglu, Gizem, Pelin Bolat e Emre Duzenli. "Modelling of Maritime Cyber Security Education and Training". Pedagogika-Pedagogy 95, n. 6s (29 agosto 2023): 64–78. http://dx.doi.org/10.53656/ped2023-6s.07.
Testo completoAhmed, Adel A. "Lightweight Digital Certificate Management and Efficacious Symmetric Cryptographic Mechanism over Industrial Internet of Things". Sensors 21, n. 8 (16 aprile 2021): 2810. http://dx.doi.org/10.3390/s21082810.
Testo completoLee, Jung-Chieh, Chung-Yang Chen e Yih-Chearng Shiue. "The moderating effects of organisational culture on the relationship between absorptive capacity and software process improvement success". Information Technology & People 30, n. 1 (6 marzo 2017): 47–70. http://dx.doi.org/10.1108/itp-09-2013-0171.
Testo completoMuttaqin, Hidayatul, e Kalamullah Ramli. "Designing An Information Security Framework For The Indonesia Water Industry Sector". Cakrawala Repositori IMWI 6, n. 3 (7 luglio 2023): 771–80. http://dx.doi.org/10.52851/cakrawala.v6i3.352.
Testo completoLerro, Angelo, Alberto Brandl, Manuela Battipede e Piero Gili. "Preliminary Design of a Model-Free Synthetic Sensor for Aerodynamic Angle Estimation for Commercial Aviation". Sensors 19, n. 23 (23 novembre 2019): 5133. http://dx.doi.org/10.3390/s19235133.
Testo completoVasiliev, S. A., I. A. Nikonova e O. S. Miroshnichenko. "Banks, Financial Platforms and Big Data: Development Trends and Regulation Directions". Financial Journal 14, n. 5 (ottobre 2022): 105–19. http://dx.doi.org/10.31107/2075-1990-2022-5-105-119.
Testo completoMeng, Baoluo, Daniel Larraz, Kit Siu, Abha Moitra, John Interrante, William Smith, Saswata Paul et al. "VERDICT: A Language and Framework for Engineering Cyber Resilient and Safe System". Systems 9, n. 1 (3 marzo 2021): 18. http://dx.doi.org/10.3390/systems9010018.
Testo completoJeyaraj, Andrew K., e Susan Liscouët-Hanke. "A Safety-Focused System Architecting Framework for the Conceptual Design of Aircraft Systems". Aerospace 9, n. 12 (3 dicembre 2022): 791. http://dx.doi.org/10.3390/aerospace9120791.
Testo completo