Добірка наукової літератури з теми "CyberSecurty"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "CyberSecurty".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "CyberSecurty"
Ham, Jeroen Van Der. "Toward a Better Understanding of “Cybersecurity”." Digital Threats: Research and Practice 2, no. 3 (July 2021): 1–3. http://dx.doi.org/10.1145/3442445.
Повний текст джерелаCalliess, Christian, and Ansgar Baumgarten. "Cybersecurity in the EU The Example of the Financial Sector: A Legal Perspective." German Law Journal 21, no. 6 (September 2020): 1149–79. http://dx.doi.org/10.1017/glj.2020.67.
Повний текст джерелаCampbell, Robert D. "Cybersecurity." ACM SIGCSE Bulletin 35, no. 2 (June 2003): 24–26. http://dx.doi.org/10.1145/782941.782965.
Повний текст джерелаBOHATY, ROCHELLE F. H. "CYBERSECURITY." Chemical & Engineering News 86, no. 44 (November 3, 2008): 18–20. http://dx.doi.org/10.1021/cen-v086n044.p018.
Повний текст джерелаPullin, Dennis W. "Cybersecurity." Frontiers of Health Services Management 35, no. 1 (2018): 3–12. http://dx.doi.org/10.1097/hap.0000000000000038.
Повний текст джерелаCACM Staff. "Cybersecurity." Communications of the ACM 60, no. 4 (March 24, 2017): 20–21. http://dx.doi.org/10.1145/3051455.
Повний текст джерелаMaurer, Chris, Kevin Kim, Dan Kim, and Leon A. Kappelman. "Cybersecurity." Communications of the ACM 64, no. 2 (January 25, 2021): 28–30. http://dx.doi.org/10.1145/3399667.
Повний текст джерелаRatnayake, Deepthi. "Cybersecurity." ITNOW 64, no. 1 (February 17, 2022): 37. http://dx.doi.org/10.1093/itnow/bwac019.
Повний текст джерелаRatnayake, Deepthi. "Cybersecurity." ITNOW 64, no. 2 (May 12, 2022): 49. http://dx.doi.org/10.1093/itnow/bwac056.
Повний текст джерелаTagarev, Todor. "Intelligence, Crime and Cybersecurity." Information & Security: An International Journal 31 (2014): 05–06. http://dx.doi.org/10.11610/isij.3100.
Повний текст джерелаДисертації з теми "CyberSecurty"
Петрухно, Ігор Русланович. "Data Mining та машинні техніки навчання для виявлення вторгнення в кібербезпеку робототехнічних та автономних систем". Master's thesis, Київ, 2018. https://ela.kpi.ua/handle/123456789/26428.
Повний текст джерелаThe paper deals with the problem of cybersecurity associated with methods of analysis of large data sets for robotic systems. The object of this work is a research system based on the methodology of parallel computing using Hadoop tools. The subject is the methods and processes of Data Mining and machine learning techniques to detect the invasion of the cybersecurity of robotic and autonomous systems. In the given work, the main features of the existing system (SIEM) are considered. which allows processing large volumes of data, its advantages and disadvantages, Analysis of the tactics for constructing the Security Analitics System, which affect the accuracy, reliability, performance, scalability of project IDS systems. A research system implemented on the basis of parallel computing methodology using the Hadoop tools, which provides effective operation under attack conditions. This system can be used in the activities of a particular institution, and can also be used by other institutions to improve parallel computing using Hadoop tools, this concept can also be used as a methodological guide for the development of a system for detecting cybersecurity robotic and autonomous systems . Allows you to increase the speed of data processing and reduce the time of data analysis using the MapReduce paradigm. The size of the explanatory note is 111 sheets, contains 31 illustrations, 26 tables, 5 appendices.
Poluzzi, Lorenzo. "IA & Cybersecurity." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020.
Знайти повний текст джерелаHoward, David J. "Development of the Cybersecurity Attitudes Scale and Modeling Cybersecurity Behavior and its Antecedents." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7306.
Повний текст джерелаLingelbach, Kembley Kay. "Perceptions of Female Cybersecurity Professionals Toward Factors that Encourage Females to the Cybersecurity Field." Diss., NSUWorks, 2018. https://nsuworks.nova.edu/gscis_etd/1056.
Повний текст джерелаTagert, Adam C. "Cybersecurity Challenges in Developing Nations." Research Showcase @ CMU, 2010. http://repository.cmu.edu/dissertations/22.
Повний текст джерелаFalco, Gregory J. "Cybersecurity for urban critical infrastructure." Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/118226.
Повний текст джерелаCataloged from PDF version of thesis.
Includes bibliographical references (pages 110-116).
Our cities are under attack. Urban critical infrastructure which includes the electric grid, water networks, transportation systems and public health and safety services are constantly being targeted by cyberattacks. Urban critical infrastructure has been increasingly connected to the internet for the purpose of operational convenience and efficiency as part of the growing Industrial Internet of Things (HoT). Unfortunately, when deciding to connect these systems, their cybersecurity was not taken seriously. A hacker can monitor, access and change these systems at their discretion because of the infrastructure's lack of security. This is not only a matter of potential inconvenience. Digital manipulation of these devices can have devastating physical consequences. This dissertation describes three steps cities should take to prepare for cyberattacks and defend themselves accordingly. First, cities must understand how an attacker might compromise its critical infrastructure. In the first chapter, I describe and demonstrate a methodology for enumerating attack vectors across a citys CCTV security system. The attack methodology uses established cybersecurity typologies to develop an attack ruleset for an Al planner that was programmed to perform attack generation. With this, cities can automatically determine all possible approaches hackers can take to compromise their critical infrastructure. Second, cities need to prioritize their cyber risks. There are hundreds of attack permutations for a given system and thousands for a city. In the second chapter, I develop a risk model for urban critical infrastructure. The model helps prioritize vulnerabilities that are frequently exploited for HoT Supervisory Control and Data Acquisition (SCADA) systems. Finally, cities need tools to defend themselves. In the third chapter, I present a nontechnical approach to defending against attacks called cyber negotiation. Cyber negotiation is one of several non-technical cyberdefense tools I call Defensive Social Engineering, where victims can use social engineering against the hacker. Cyber negotiation involves using a negotiation framework to defend against attacks with steps urban critical infrastructure operators can take before, during and after an attack. This study combines computer science and urban planning (Urban Science) to provide a starting point for cities to prepare for and protect themselves against cyberattacks.
by Gregory J. Falco.
Ph. D.
Pierce, Adam O. "Exploring the Cybersecurity Hiring Gap." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/3198.
Повний текст джерелаReid, Rayne. "Guidelines for cybersecurity education campaigns." Thesis, Nelson Mandela University, 2017. http://hdl.handle.net/10948/14091.
Повний текст джерелаNilsen, Richard. "Measuring Cybersecurity Competency: An Exploratory Investigation of the Cybersecurity Knowledge, Skills, and Abilities Necessary for Organizational Network Access Privileges." NSUWorks, 2017. http://nsuworks.nova.edu/gscis_etd/1017.
Повний текст джерелаTaiola, Matteo. "Cybersecurity in impianti dell'industria di processo." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021.
Знайти повний текст джерелаКниги з теми "CyberSecurty"
Guiora, Amos N. Cybersecurity. Boca Raton, FL : Routledge, 2017.: Routledge, 2017. http://dx.doi.org/10.1201/9781315370231.
Повний текст джерелаBrooks, Charles J., Christopher Grow, Philip Craig, and Donald Short. Cybersecurity. Indianapolis, Indiana: John Wiley & Sons, Inc., 2018. http://dx.doi.org/10.1002/9781119369141.
Повний текст джерелаKumar, Gautam, Om Prakash Singh, and Hemraj Saini. Cybersecurity. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003145042.
Повний текст джерелаAbd El-Latif, Ahmed A., and Christos Volos, eds. Cybersecurity. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-92166-8.
Повний текст джерелаDonaldson, Scott E., Stanley G. Siegel, Chris K. Williams, and Abdul Aslam. Enterprise Cybersecurity. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4302-6083-7.
Повний текст джерелаConti, Mauro, Gaurav Somani, and Radha Poovendran, eds. Versatile Cybersecurity. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-97643-3.
Повний текст джерелаWaschke, Marvin. Personal Cybersecurity. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-2430-4.
Повний текст джерелаAyala, Luis. Cybersecurity Lexicon. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2068-9.
Повний текст джерелаBeissel, Stefan. Cybersecurity Investments. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30460-1.
Повний текст джерелаKaplan, James M., Tucker Bailey, Chris Rezek, Derek O'Halloran, and Alan Marcus, eds. Beyond Cybersecurity. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781119055228.
Повний текст джерелаЧастини книг з теми "CyberSecurty"
Wolfe, Jennifer C. "Cybersecurity." In Disruption in the Boardroom, 51–82. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6159-0_4.
Повний текст джерелаZaffar, Ehsan. "Cybersecurity." In Understanding Homeland Security, 399–439. Abingdon, Oxon; New York. NY: Routledge, 2019. |: Routledge, 2019. http://dx.doi.org/10.4324/9780323296243-8.
Повний текст джерелаJackson, Scott, and Ricardo Moraes dos Santos. "Cybersecurity." In Systems Approach to the Design of Commercial Aircraft, 57–60. First edition. | Boca Raton, FL : CRC Press, 2020.: CRC Press, 2020. http://dx.doi.org/10.1201/9781003053750-12.
Повний текст джерелаKulesza, Joanna. "Cybersecurity." In Encyclopedia of Big Data, 1–5. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-32001-4_53-1.
Повний текст джерелаRefsdal, Atle, Bjørnar Solhaug, and Ketil Stølen. "Cybersecurity." In Cyber-Risk Management, 29–32. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23570-7_4.
Повний текст джерелаRoy, Jeffrey. "Cybersecurity." In Public Administration and Information Technology, 59–68. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-7221-6_5.
Повний текст джерелаSiers, Rhea. "Cybersecurity." In Security Studies, 556–68. Third edition. | New York : Routledge, 2018. |: Routledge, 2018. http://dx.doi.org/10.4324/9781315228358-38.
Повний текст джерелаWichum, Ricky. "Cybersecurity." In Handbuch Virtualität, 1–13. Wiesbaden: Springer Fachmedien Wiesbaden, 2018. http://dx.doi.org/10.1007/978-3-658-16358-7_36-1.
Повний текст джерелаWichum, Ricky. "Cybersecurity." In Handbuch Virtualität, 669–80. Wiesbaden: Springer Fachmedien Wiesbaden, 2020. http://dx.doi.org/10.1007/978-3-658-16342-6_36.
Повний текст джерелаIslam, Md Shariful. "Cybersecurity." In Routledge Companion to Global Cyber-Security Strategy, 349–55. New York : Routledge, 2020.: Routledge, 2020. http://dx.doi.org/10.4324/9780429399718-29.
Повний текст джерелаТези доповідей конференцій з теми "CyberSecurty"
Abdel-Fattah, Farhan, Fadel AlTamimi, and Khalid A. Farhan. "Machine Learning and Data Mining in Cybersecurty." In 2021 International Conference on Information Technology (ICIT). IEEE, 2021. http://dx.doi.org/10.1109/icit52682.2021.9491749.
Повний текст джерелаRossi, Paola, Itai Sela, Adam Rizika, Diogenes Angelidis, Mark Duck, and Ron Morrison. "Cyberdefence of Offshore Deepwater Drilling Rigs." In Offshore Technology Conference. OTC, 2021. http://dx.doi.org/10.4043/31235-ms.
Повний текст джерелаDlamini, Moses, Hein Venter, Jan Eloff, and Mariki Eloff. "Digital deception in cybersecurity: an information behaviour lens." In ISIC: the Information Behaviour Conference. University of Borås, Borås, Sweden, 2020. http://dx.doi.org/10.47989/irisic2018.
Повний текст джерелаKim, Euiyoung, Jieun Kwon, JungKyoon Yoon, and Alice M. Agogino. "Embedding Cybersecurity Into Design Education: Increasing Designers’ Awareness of Cybersecurity Throughout the Design Process." In ASME 2019 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2019. http://dx.doi.org/10.1115/detc2019-97720.
Повний текст джерелаEasttom, Chuck. "Applying Mathematics and Engineering Techniques to Cyber Security." In Congreso Internacional de Ingeniería de Sistemas. Universidad de Lima, 2021. http://dx.doi.org/10.26439/ciis2021.5575.
Повний текст джерелаChopra, Shubham, Hitesh Marwaha, and Anurag Sharma. "Cyber-Attacks Identification and Measures for Prevention." In International Conference on Cybersecurity and Cybercrime. Romanian Association for Information Security Assurance, 2022. http://dx.doi.org/10.19107/cybercon.2022.11.
Повний текст джерелаKemmerer, R. A. "Cybersecurity." In 25th International Conference on Software Engineering, 2003. Proceedings. IEEE, 2003. http://dx.doi.org/10.1109/icse.2003.1201257.
Повний текст джерелаMaymí, Fernando J. "Cybersecurity." In SIGITE '19: The 20th Annual Conference on Information Technology Education. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3349266.3355613.
Повний текст джерелаThapa, Bipun. "Sentiment Analysis of Cyber Security Content on Twitter and Reddit." In 3rd International Conference on Data Mining and Machine Learning (DMML 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.120708.
Повний текст джерела"Cybersecurity, IT-aided Education, and TeLEs: Nexus, Vistas & Realities." In InSITE 2019: Informing Science + IT Education Conferences: Jerusalem. Informing Science Institute, 2019. http://dx.doi.org/10.28945/4153.
Повний текст джерелаЗвіти організацій з теми "CyberSecurty"
Joo, Jhi Young, Emma Stewart, Benjamin Salazar, and Nathan Yee. Selection of Ten (10) Cybersecurity Scenarios For Project Cybersecure Interconnection of Distributed Energy Resources. Office of Scientific and Technical Information (OSTI), November 2018. http://dx.doi.org/10.2172/1498462.
Повний текст джерелаFlorakis, Chris, Christodoulos Louca, Roni Michaely, and Michael Weber. Cybersecurity Risk. Cambridge, MA: National Bureau of Economic Research, December 2020. http://dx.doi.org/10.3386/w28196.
Повний текст джерелаAlecu, Iulian, Costel Ciuchi, Toma Cimpeanu, Iulian Coman, Larisa Gabudeanu, Ioan-Cosmin Mihai, Cosmina Moghior, et al. Cybersecurity Guide. Romanian Association for Information Security Assurance, January 2021. http://dx.doi.org/10.19107/cybersec.2021.en.
Повний текст джерелаGuice, Leslie K. Cybersecurity Laboratory & Cybersecurity Research Program at the CRL. Fort Belvoir, VA: Defense Technical Information Center, August 2014. http://dx.doi.org/10.21236/ada608802.
Повний текст джерелаNewhouse, William, Stephanie Keith, Benjamin Scribner, and Greg Witte. National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework. Gaithersburg, MD: National Institute of Standards and Technology, August 2017. http://dx.doi.org/10.6028/nist.sp.800-181.
Повний текст джерелаNewhouse, William, Stephanie Keith, Benjamin Scribner, and Greg Witte. National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (Portuguese translation). National Institute of Standards and Technology, February 2022. http://dx.doi.org/10.6028/nist.sp.800-181pt.
Повний текст джерелаNewhouse, William, Stephanie Keith, Benjamin Scribner, and Greg Witte. National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (Spanish translation). National Institute of Standards and Technology, February 2022. http://dx.doi.org/10.6028/nist.sp.800-181es.
Повний текст джерелаNewhouse, Bill. National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (Ukrainian translation). National Institute of Standard and Technology, May 2022. http://dx.doi.org/10.6028/nist.sp.800-181.ukr.
Повний текст джерелаJohnson, Jay Tillay. PV Cybersecurity Final Report. Office of Scientific and Technical Information (OSTI), January 2019. http://dx.doi.org/10.2172/1491601.
Повний текст джерелаStouffer, Keith, Timothy Zimmerman, CheeYee Tang, Joshua Lubell, Jeffrey Cichonski, and John McCarthy. Cybersecurity framework manufacturing profile. Gaithersburg, MD: National Institute of Standards and Technology, September 2017. http://dx.doi.org/10.6028/nist.ir.8183.
Повний текст джерела