Статті в журналах з теми "Cyber-FIT"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Cyber-FIT".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Watkins, Laura E., Rosalita C. Maldonado, and David DiLillo. "The Cyber Aggression in Relationships Scale: A New Multidimensional Measure of Technology-Based Intimate Partner Aggression." Assessment 25, no. 5 (September 2, 2016): 608–26. http://dx.doi.org/10.1177/1073191116665696.
Повний текст джерелаNtingi, Nombeko, Petrus Duvenage, Jaco Du Toit, and Sebastian Von Solms. "Effective Cyber Threat Hunting: Where and how does it fit?" European Conference on Cyber Warfare and Security 21, no. 1 (June 8, 2022): 206–13. http://dx.doi.org/10.34190/eccws.21.1.240.
Повний текст джерелаYaokumah, Winfred. "Development and Psychometric Analysis of Cyber Ethics Instrument (CEI)." International Journal of Technoethics 12, no. 1 (January 2021): 54–74. http://dx.doi.org/10.4018/ijt.2021010104.
Повний текст джерелаEffendy, Faried, Eto Wuryanto, and Livia Felisia Marentina. "Penerapan Model Technology-to-Performance Chain pada Cyber Campus." Jurnal Edukasi dan Penelitian Informatika (JEPIN) 5, no. 2 (August 6, 2019): 176. http://dx.doi.org/10.26418/jp.v5i2.32684.
Повний текст джерелаYılmaz Bingöl, Tuğba. "Determining The Predictors of Self-Efficacy and Cyber Bullying." International Journal of Higher Education 7, no. 2 (March 23, 2018): 138. http://dx.doi.org/10.5430/ijhe.v7n2p138.
Повний текст джерелаNiki, O’Brien, Ghafur Saira, Sivaramakrishnan Arvind, and Durkin Mike. "Cyber-attacks are a permanent and substantial threat to health systems: Education must reflect that." DIGITAL HEALTH 8 (January 2022): 205520762211046. http://dx.doi.org/10.1177/20552076221104665.
Повний текст джерелаSlack, Chelsey, and Neil Robinson. "Co-operation: A Key to NATOs Cyberspace Endeavour." European Foreign Affairs Review 24, Issue 2 (May 1, 2019): 154–66. http://dx.doi.org/10.54648/eerr2019010.
Повний текст джерелаMohammadi, Fazel. "Emerging Challenges in Smart Grid Cybersecurity Enhancement: A Review." Energies 14, no. 5 (March 3, 2021): 1380. http://dx.doi.org/10.3390/en14051380.
Повний текст джерелаPinko, Eyal. "Maritime Cyber Threats and Challenges." National security and the future 20, no. 1-2 (January 9, 2020): 63–70. http://dx.doi.org/10.37458/nstf.20.1-2.7.
Повний текст джерелаLeslie, Nandi O., Richard E. Harang, Lawrence P. Knachel, and Alexander Kott. "Statistical models for the number of successful cyber intrusions." Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 15, no. 1 (June 30, 2017): 49–63. http://dx.doi.org/10.1177/1548512917715342.
Повний текст джерелаFarrell, Albert D., Erin L. Thompson, Krista R. Mehari, Terri N. Sullivan, and Elizabeth A. Goncy. "Assessment of In-Person and Cyber Aggression and Victimization, Substance Use, and Delinquent Behavior During Early Adolescence." Assessment 27, no. 6 (August 3, 2018): 1213–29. http://dx.doi.org/10.1177/1073191118792089.
Повний текст джерелаAlismaiel, Omar A. "Digital Media Used in Education: The Influence on Cyberbullying Behaviors among Youth Students." International Journal of Environmental Research and Public Health 20, no. 2 (January 12, 2023): 1370. http://dx.doi.org/10.3390/ijerph20021370.
Повний текст джерелаAderibigbe, Nurudeen, Dennis Ocholla, and Johannes Britz. "Differences in Ethical Cyber Behavioural Intention of Nigerian and South African Students: A Multi-Group Analysis Based on the Theory of Planned Behaviour." Libri 71, no. 4 (October 20, 2021): 389–406. http://dx.doi.org/10.1515/libri-2019-0062.
Повний текст джерелаLara, Laura. "Cyber dating abuse: Assessment, prevalence, and relationship with offline violence in young Chileans." Journal of Social and Personal Relationships 37, no. 5 (February 27, 2020): 1681–99. http://dx.doi.org/10.1177/0265407520907159.
Повний текст джерелаGörzig, Anke, Tijana Milosevic, and Elisabeth Staksrud. "Cyberbullying Victimization in Context: The Role of Social Inequalities in Countries and Regions." Journal of Cross-Cultural Psychology 48, no. 8 (August 18, 2017): 1198–215. http://dx.doi.org/10.1177/0022022116686186.
Повний текст джерелаBrants, Chrisje, Adam Jackson, and Tim J. Wilson. "A Comparative Analysis of Anglo-Dutch Approaches to ‘Cyber Policing’: Checks and Balances Fit for Purpose?" Journal of Criminal Law 84, no. 5 (October 2020): 451–73. http://dx.doi.org/10.1177/0022018320952561.
Повний текст джерелаRicaforte, Lhuillier B. "Social Media Exposure and Usage of Cyber Slang: Bases in Examining the Academic Writing Conventions of the Students." Shanti Journal 1, no. 1 (August 31, 2022): 229–54. http://dx.doi.org/10.3126/shantij.v1i1.47906.
Повний текст джерелаEichensehr, Kristen E. "Ukraine, Cyberattacks, and the Lessons for International Law." AJIL Unbound 116 (2022): 145–49. http://dx.doi.org/10.1017/aju.2022.20.
Повний текст джерелаSjursø, Ida Risanger, Hildegunn Fandrem, James O’Higgins Norman, and Erling Roland. "Teacher Authority in Long-Lasting Cases of Bullying: A Qualitative Study from Norway and Ireland." International Journal of Environmental Research and Public Health 16, no. 7 (March 31, 2019): 1163. http://dx.doi.org/10.3390/ijerph16071163.
Повний текст джерелаAgarwal, Nitin, Sean Andrist, Dan Bohus, Fei Fang, Laurie Fenstermacher, Lalana Kagal, Takashi Kido, et al. "Reports on the 2015 AAAI Spring Symposium Series." AI Magazine 36, no. 3 (September 28, 2015): 113–19. http://dx.doi.org/10.1609/aimag.v36i3.2608.
Повний текст джерелаLiu, Hongyu, and Bo Lang. "Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey." Applied Sciences 9, no. 20 (October 17, 2019): 4396. http://dx.doi.org/10.3390/app9204396.
Повний текст джерелаSohn, Hee-jeong. "Strange Passion: Gore Masculinity in the Digital Age." Sookmyung Research Institute of Humanities 12 (October 31, 2022): 57–83. http://dx.doi.org/10.37123/th.2022.12.57.
Повний текст джерелаMitra, Amit, and Nicholas O’Regan. "Creative Leadership Within the Cyber asset Market: An Interview With Dame Inga Beale." Journal of Management Inquiry 29, no. 1 (February 21, 2019): 51–58. http://dx.doi.org/10.1177/1056492619828837.
Повний текст джерелаMonedero, Íñigo, Julio Barbancho, Rafael Márquez, and Juan F. Beltrán. "Cyber-Physical System for Environmental Monitoring Based on Deep Learning." Sensors 21, no. 11 (May 24, 2021): 3655. http://dx.doi.org/10.3390/s21113655.
Повний текст джерелаArsene, Camelia Gabriela, and George Constantin. "Industry 4.0: Key Questions in Manufacturing." MATEC Web of Conferences 290 (2019): 02003. http://dx.doi.org/10.1051/matecconf/201929002003.
Повний текст джерелаBeggs, Christopher, and Ryan McGowan. "Fostering SCADA and IT Relationships." International Journal of Cyber Warfare and Terrorism 1, no. 3 (July 2011): 1–11. http://dx.doi.org/10.4018/ijcwt.2011070101.
Повний текст джерелаAlmoughem, Khaled. "The Future of Cybersecurity Workforce Development." Academic Journal of Research and Scientific Publishing 4, no. 45 (January 5, 2023): 37–48. http://dx.doi.org/10.52132/ajrsp.en.2023.45.3.
Повний текст джерелаLee, Jungup, Neil Abell, and Jennifer L. Holmes. "Validation of Measures of Cyberbullying Perpetration and Victimization in Emerging Adulthood." Research on Social Work Practice 27, no. 4 (March 31, 2015): 456–67. http://dx.doi.org/10.1177/1049731515578535.
Повний текст джерелаZhang, Xiaohui, Xianghua Miao, and Mingying Xue. "A Reputation-Based Approach Using Consortium Blockchain for Cyber Threat Intelligence Sharing." Security and Communication Networks 2022 (August 10, 2022): 1–20. http://dx.doi.org/10.1155/2022/7760509.
Повний текст джерелаHou, Fang. "Echoing Mechanism of Juvenile Delinquency Prevention and Occupational Therapy Education Guidance Based on Artificial Intelligence." Occupational Therapy International 2022 (September 29, 2022): 1–10. http://dx.doi.org/10.1155/2022/9115547.
Повний текст джерелаKrush, Dmytro, Christoph Cammin, Ralf Heynicke, Gerd Scholl, and Bernd Kaercher. "A wireless communication system for energy and environmental monitoring." Journal of Sensors and Sensor Systems 6, no. 1 (January 10, 2017): 19–26. http://dx.doi.org/10.5194/jsss-6-19-2017.
Повний текст джерелаLi, Xuelan, Xiao Li, and Jiyu Jiang. "Deep Intelligence-Driven Efficient Forecasting for the Agriculture Economy of Computational Social Systems." Computational Intelligence and Neuroscience 2022 (September 27, 2022): 1–12. http://dx.doi.org/10.1155/2022/2854675.
Повний текст джерелаKilovaty, Ido. "The Elephant in the Room: Coercion." AJIL Unbound 113 (2019): 87–91. http://dx.doi.org/10.1017/aju.2019.10.
Повний текст джерелаQuint, Fabian, Katharina Mura, and Dominic Gorecky. "In-Factory Learning – Qualification For The Factory Of The Future." ACTA Universitatis Cibiniensis 66, no. 1 (July 1, 2015): 159–64. http://dx.doi.org/10.1515/aucts-2015-0046.
Повний текст джерелаYerpude, Samir, and Tarun Kumar Singhal. "Value Enablement of Collaborative Supply Chain Environment Embedded With the Internet of Things." International Journal of Intelligent Information Technologies 16, no. 3 (July 2020): 19–51. http://dx.doi.org/10.4018/ijiit.2020070102.
Повний текст джерелаBanerjee, Shruti, Partha Sarathi Chakraborty, and . "Proposed approach to detect distributed denial of service attacks in software defined network using machine learning algorithms." International Journal of Engineering & Technology 7, no. 2.8 (March 19, 2018): 472. http://dx.doi.org/10.14419/ijet.v7i2.8.10488.
Повний текст джерелаAbdel-Basset, Mohamed, Reda Mohamed, Nazeeruddin Mohammad, Karam Sallam, and Nour Moustafa. "An Adaptive Cuckoo Search-Based Optimization Model for Addressing Cyber-Physical Security Problems." Mathematics 9, no. 10 (May 18, 2021): 1140. http://dx.doi.org/10.3390/math9101140.
Повний текст джерелаAlqahtani, Abdulrahman. "Towards a framework for the potential cyber-terrorist threat to critical national infrastructure." Information & Computer Security 23, no. 5 (November 9, 2015): 532–69. http://dx.doi.org/10.1108/ics-09-2014-0060.
Повний текст джерелаAgarwal, Arushi, Purushottam Sharma, Mohammed Alshehri, Ahmed A. Mohamed, and Osama Alfarraj. "Classification model for accuracy and intrusion detection using machine learning approach." PeerJ Computer Science 7 (April 7, 2021): e437. http://dx.doi.org/10.7717/peerj-cs.437.
Повний текст джерелаIkuabe, Matthew, Clinton Aigbavboa, Chimay Anumba, Ayodeji Oke, and Lerato Aghimien. "Confirmatory Factor Analysis of Performance Measurement Indicators Determining the Uptake of CPS for Facilities Management." Buildings 12, no. 4 (April 11, 2022): 466. http://dx.doi.org/10.3390/buildings12040466.
Повний текст джерелаRaimundo, Ricardo Jorge, and Albérico Travassos Rosário. "Cybersecurity in the Internet of Things in Industrial Management." Applied Sciences 12, no. 3 (February 2, 2022): 1598. http://dx.doi.org/10.3390/app12031598.
Повний текст джерелаToode, Ülle. "Charismatic Leaders in a New Perspective: Reality in Estonia and Italy." Studies in Media and Communication 8, no. 1 (March 2, 2020): 11. http://dx.doi.org/10.11114/smc.v8i1.4676.
Повний текст джерелаKhan, Zeeshan Ali, and Peter Herrmann. "Recent Advancements in Intrusion Detection Systems for the Internet of Things." Security and Communication Networks 2019 (July 3, 2019): 1–19. http://dx.doi.org/10.1155/2019/4301409.
Повний текст джерелаSemerci, Ali. "Investigating the effects of personality traits on cyberbullying." Pegem Eğitim ve Öğretim Dergisi 7, no. 2 (April 8, 2017): 211–30. http://dx.doi.org/10.14527/pegegog.2017.008.
Повний текст джерелаArsenijević, Jasmina, and Dejan Arsenijević. "Public relations in the digital era: New methods and tools." Univerzitetska misao - casopis za nauku, kulturu i umjetnost, Novi Pazar, no. 20 (2021): 54–65. http://dx.doi.org/10.5937/univmis2120054a.
Повний текст джерелаEricsson, Mikael, Dahniel Johansson, and David Stjern. "AI-Based Quality Control of Wood Surfaces with Autonomous Material Handling." Applied Sciences 11, no. 21 (October 25, 2021): 9965. http://dx.doi.org/10.3390/app11219965.
Повний текст джерелаRistić, Predrag, and Sanja Čelik. "Public relations in the digital era: New methods and tools." Univerzitetska misao - casopis za nauku, kulturu i umjetnost, Novi Pazar, no. 19 (2020): 74–85. http://dx.doi.org/10.5937/univmis2019074r.
Повний текст джерелаCao, Yuanlong, Ruiwen Ji, Lejun Ji, Mengshuang Bao, Lei Tao, and Wei Yang. "Can Multipath TCP Be Robust to Cyber Attacks? A Measuring Study of MPTCP with Active Queue Management Algorithms." Security and Communication Networks 2021 (May 27, 2021): 1–11. http://dx.doi.org/10.1155/2021/9963829.
Повний текст джерелаIliyasu, Auwal Sani, Usman Alhaji Abdurrahman, and Lirong Zheng. "Few-Shot Network Intrusion Detection Using Discriminative Representation Learning with Supervised Autoencoder." Applied Sciences 12, no. 5 (February 24, 2022): 2351. http://dx.doi.org/10.3390/app12052351.
Повний текст джерелаWambui, Boniface Mwangi, Joyce W. Gikandi, and Geoffrey Mariga Wambugu. "A Suvery of Biometric Authentication Technologies Towards Secure And Robust Systems: A Case Study of Mount Kenya University." Computer and Information Science 15, no. 2 (March 17, 2022): 43. http://dx.doi.org/10.5539/cis.v15n2p43.
Повний текст джерела