Статті в журналах з теми "Strategic cyber security"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Strategic cyber security".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Kuusisto, Tuija, and Rauno Kuusisto. "Strategic Communication for Supporting Cyber-Security." International Journal of Cyber Warfare and Terrorism 3, no. 3 (July 2013): 72–79. http://dx.doi.org/10.4018/ijcwt.2013070105.
Повний текст джерелаBorum, Randy, John Felker, Sean Kern, Kristen Dennesen, and Tonya Feyes. "Strategic cyber intelligence." Information & Computer Security 23, no. 3 (July 13, 2015): 317–32. http://dx.doi.org/10.1108/ics-09-2014-0064.
Повний текст джерелаFischer, Bruno, Dirk Meissner, Richard Nyuur, and David Sarpong. "Guest Editorial: Cyber-Attacks, Strategic Cyber-Foresight, and Security." IEEE Transactions on Engineering Management 69, no. 6 (December 2022): 3660–63. http://dx.doi.org/10.1109/tem.2022.3204165.
Повний текст джерелаLehto, Martti. "The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies." International Journal of Cyber Warfare and Terrorism 3, no. 3 (July 2013): 1–18. http://dx.doi.org/10.4018/ijcwt.2013070101.
Повний текст джерелаJuurvee, Ivo, and Uku Arold. "Psychological Defence and Cyber Security." Revista ICONO14 Revista científica de Comunicación y Tecnologías emergentes 19, no. 1 (January 1, 2021): 70–94. http://dx.doi.org/10.7195/ri14.v19i1.1628.
Повний текст джерелаRomashkina, Nataliya, and Dmitry Stefanovich. "Strategic Risks and Problems of Cyber Security." Voprosy kiberbezopasnosti, no. 5(39) (2020): 77–86. http://dx.doi.org/10.21681/2311-3456-2020-05-77-86.
Повний текст джерелаJames, Lee. "Making cyber-security a strategic business priority." Network Security 2018, no. 5 (May 2018): 6–8. http://dx.doi.org/10.1016/s1353-4858(18)30042-4.
Повний текст джерелаAlghamdi, Mohammed I. "A Strategic Vision to Reduce Cybercrime to Enhance Cyber Security." Webology 17, no. 2 (December 21, 2020): 289–95. http://dx.doi.org/10.14704/web/v17i2/web17031.
Повний текст джерелаBarber, Craig. "Cyber Security Predicting the Future." ITNOW 62, no. 1 (February 17, 2020): 30–31. http://dx.doi.org/10.1093/itnow/bwaa013.
Повний текст джерелаMANUILOV, Y. "Overview of novels of domestic legislation in the field of cyber security (on the example of the Cyber Security Strategy of Ukraine for 2021 – 2025)." INFORMATION AND LAW, no. 4(39) (December 9, 2021): 98–105. http://dx.doi.org/10.37750/2616-6798.2021.4(39).248821.
Повний текст джерелаITAI, YAYA, and Emmanuel Onwubiko. "Impact of Ransomware on Cybersecurity." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 17, no. 1 (January 16, 2018): 7077–80. http://dx.doi.org/10.24297/ijct.v17i1.6750.
Повний текст джерелаRamadhan, Iqbal. "STRATEGI KEAMANAN CYBER SECURITY DI KAWASAN ASIA TENGGARA." Jurnal Asia Pacific Studies 3, no. 2 (January 16, 2020): 181–92. http://dx.doi.org/10.33541/japs.v3i1.1081.
Повний текст джерелаZvozdetska, Oksana. "NATO’s new strategic concept in cybersecurity issues in the context of up-to-the date vulnerability and threat information." Mediaforum : Analytics, Forecasts, Information Management, no. 6 (December 17, 2018): 71–93. http://dx.doi.org/10.31861/mediaforum.2018.6.71-93.
Повний текст джерелаGRIBOIEDOV, S. "Some issues of improving state planning in the sphere of cyber security in conditions of hybrid threats." INFORMATION AND LAW, no. 1(36) (March 11, 2021): 114–22. http://dx.doi.org/10.37750/2616-6798.2021.1(36).238191.
Повний текст джерелаShairgojri, Aadil Ahmad, and Showkat Ahmad Dar. "Emerging Cyber Security India’s Concern and Threats." Journal of Artificial Intelligence, Machine Learning and Neural Network, no. 25 (August 2, 2022): 1–10. http://dx.doi.org/10.55529/jaimlnn.25.1.10.
Повний текст джерелаShairgojri, Aadil Ahmad, and Showkat Ahmad Dar. "Emerging Cyber Security India’s Concern and Threats." International Journal of Information technology and Computer Engineering, no. 24 (July 31, 2022): 17–26. http://dx.doi.org/10.55529/ijitc.24.17.26.
Повний текст джерелаShairgojri, Aadil Ahmad, and Showkat Ahmad Dar. "Emerging Cyber Security India’s Concern and Threats." Journal of Technology Innovations and Energy 1, no. 2 (June 18, 2022): 39–44. http://dx.doi.org/10.56556/jtie.v1i2.201.
Повний текст джерелаKela, Rushabh, Abhinav Chawla, Pratishtha Gaur, and Dr Manikandan K. "IMPLEMENTATION OF CYBER SECURITY ATTACKS AND STRATEGIC MITIGATION MECHANISMS." international journal of advanced research in computer science 13, no. 4 (August 20, 2022): 28–34. http://dx.doi.org/10.26483/ijarcs.v13i4.6890.
Повний текст джерелаĐekić, Milica. "How to transfer cyber security skill?" Tehnika 77, no. 3 (2022): 399–402. http://dx.doi.org/10.5937/tehnika2203399d.
Повний текст джерелаFedoniuk, Serhii, and Serhii Maghdysiuk. "US-China Confrontation in Cyber Security." Історико-політичні проблеми сучасного світу, no. 45 (June 27, 2022): 113–27. http://dx.doi.org/10.31861/mhpi2022.45.113-127.
Повний текст джерелаZhou, Hongren. "Strategic Stability in Cyberspace: A Chinese View." China Quarterly of International Strategic Studies 05, no. 01 (January 2019): 81–95. http://dx.doi.org/10.1142/s2377740019500088.
Повний текст джерелаTariq, Khawaja Dawood. "DEFINING CYBER WARFARE." ISSRA Papers 13 (December 31, 2021): 15–26. http://dx.doi.org/10.54690/issrap.v13ixiii.102.
Повний текст джерелаProshchyn, Ihor, та Volodymyr Shypovskyi. "Cyber security in the national security & defence sector of Ukraine: todayʼs challenges and ways to avoid possible threats". Journal of Scientific Papers "Social development and Security" 10, № 1 (29 лютого 2020): 3–8. http://dx.doi.org/10.33445/sds.2020.10.1.1.
Повний текст джерелаShihan, Khadija Hassan, and Mustafa Jawad Radif. "Internal and External Factors to Adopt a Cyber Security Strategy in Iraqi Organisations." Webology 19, no. 1 (January 20, 2022): 5181–98. http://dx.doi.org/10.14704/web/v19i1/web19349.
Повний текст джерелаJakubczak, Weronika, and Hon-min Yau. "TRENDS IN CYBERSECURITY REGULATIONS OF TAIWAN (REPUBLIC OF CHINA) – Phases of Pro motion of major cyber security plans and programs in the National Cyber Security Program of Taiwan (2021–2024)." Zeszyty Naukowe SGSP 1, no. 80 (December 21, 2021): 199–216. http://dx.doi.org/10.5604/01.3001.0015.6485.
Повний текст джерелаKOZUB, Marian, and Adrian Mitręga. "Strategic Thinking about Security in Cyberspace." Rocznik Bezpieczeństwa Morskiego XV - Wydanie specjalne (July 5, 2021): 1–28. http://dx.doi.org/10.5604/01.3001.0015.5893.
Повний текст джерелаHuhtinen, Aki-Mauri, Arto Hirvelä, and Tommi Kangasmaa. "The Opportunities of National Cyber Strategy and Social Media in the Rhizome Networks." International Journal of Cyber Warfare and Terrorism 4, no. 2 (April 2014): 23–34. http://dx.doi.org/10.4018/ijcwt.2014040102.
Повний текст джерелаCzosseck, Christian, Rain Ottis, and Anna-Maria Talihärm. "Estonia after the 2007 Cyber Attacks." International Journal of Cyber Warfare and Terrorism 1, no. 1 (January 2011): 24–34. http://dx.doi.org/10.4018/ijcwt.2011010103.
Повний текст джерелаChokhawala, Kirit I., Vishal H. Bhemwala, and Jayesh N. Modi. "A Strategic approach, Issues and Challenges of Adaptive Cyber Security." RESEARCH REVIEW International Journal of Multidisciplinary 5, no. 7 (July 25, 2020): 121–24. http://dx.doi.org/10.31305/rrijm.2020.v05.i07.025.
Повний текст джерелаBhattacharjee, Subimal. "The Strategic Dimensions of Cyber Security in the Indian Context." Strategic Analysis 33, no. 2 (April 2009): 196–201. http://dx.doi.org/10.1080/09700160802702619.
Повний текст джерелаKello, Lucas. "The Meaning of the Cyber Revolution: Perils to Theory and Statecraft." International Security 38, no. 2 (October 2013): 7–40. http://dx.doi.org/10.1162/isec_a_00138.
Повний текст джерелаWatanabe, Seiko. "STRATEGIC ANALYSIS OF CAPACITY BUILDING FOR THE CYBER SECURITY OF THE UNITED STATES IN ASIA." Jurnal Asia Pacific Studies 4, no. 2 (December 28, 2020): 100–111. http://dx.doi.org/10.33541/japs.v4i2.2800.
Повний текст джерелаKRASNIKOV, S. "Organizational and legal framework of strengthening state capacities in the field of cyber defense." INFORMATION AND LAW, no. 4(39) (December 9, 2021): 155–61. http://dx.doi.org/10.37750/2616-6798.2021.4(39).248846.
Повний текст джерелаPăunescu, Dragoș-Mihai. "NATO’S ENCOUNTERS IN THE CYBER DOMAIN." STRATEGIES XXI - Security and Defense Faculty 17, no. 1 (November 9, 2021): 153–58. http://dx.doi.org/10.53477/2668-2001-21-18.
Повний текст джерелаZeijlemaker, Sander, Etiënne A. J. A. Rouwette, Giovanni Cunico, Stefano Armenia, and Michael von Kutzschenbach. "Decision-Makers’ Understanding of Cyber-Security’s Systemic and Dynamic Complexity: Insights from a Board Game for Bank Managers." Systems 10, no. 2 (April 14, 2022): 49. http://dx.doi.org/10.3390/systems10020049.
Повний текст джерелаPutranti, Ika Riswanti, Anita Amaliyah, and Reni Windiani. "Smartcity : Model Ketahanan Siber Untuk Usaha Kecil Dan Menengah." Jurnal Ketahanan Nasional 26, no. 3 (December 31, 2020): 359. http://dx.doi.org/10.22146/jkn.57322.
Повний текст джерелаPandey, Shipra, Rajesh Kumar Singh, Angappa Gunasekaran, and Anjali Kaushik. "Cyber security risks in globalized supply chains: conceptual framework." Journal of Global Operations and Strategic Sourcing 13, no. 1 (January 13, 2020): 103–28. http://dx.doi.org/10.1108/jgoss-05-2019-0042.
Повний текст джерелаIsmail, Suhaila, Elena Sitnikova, and Jill Slay. "SCADA Systems Cyber Security for Critical Infrastructures." International Journal of Cyber Warfare and Terrorism 6, no. 3 (July 2016): 79–95. http://dx.doi.org/10.4018/ijcwt.2016070107.
Повний текст джерелаMolis, Arūnas, Claudia Palazzo, and Kaja Ainsalu. "Mitigating Risks of Hybrid War: Search for an Effective Energy Strategyin The Baltic States." Journal on Baltic Security 4, no. 2 (December 1, 2018): 23–32. http://dx.doi.org/10.2478/jobs-2018-0009.
Повний текст джерелаTrinks, Virgínia de Melo Dantas, Robson de Oliveira Albuquerque, Rafael Rabelo Nunes, and Gibran Ayupe Mota. "Strategic Assessment of Cyber Security Contenders to the Brazilian Agribusiness in the Beef Sector." Information 13, no. 9 (September 13, 2022): 431. http://dx.doi.org/10.3390/info13090431.
Повний текст джерелаSingh, Pukhraj. "Battle-Ready for the Fifth Dimension :." Jindal Journal of International Affairs 1, no. 1 (October 1, 2011): 339–51. http://dx.doi.org/10.54945/jjia.v1i1.24.
Повний текст джерелаSamonek, Aleksandra. "What Is the Future of European Cyber Security? Three Principles of European Cooperation and the Hybrid Joint Strategy of Cyber Defence." Studia Europejskie - Studies in European Affairs 24, no. 2 (July 19, 2020): 43–60. http://dx.doi.org/10.33067/se.2.2020.3.
Повний текст джерелаRenard, Thomas. "Partnering for Global Security: The EU, Its Strategic Partners and Transnational Security Challenges." European Foreign Affairs Review 21, Issue 1 (February 1, 2016): 9–33. http://dx.doi.org/10.54648/eerr2016003.
Повний текст джерелаDOGARU, Olguţa. "The Role of Strategic Partnerships in Maintaining Cyber Security through Cooperation." International Journal of Information Security and Cybercrime 4, no. 1 (June 29, 2015): 22–26. http://dx.doi.org/10.19107/ijisc.2015.01.03.
Повний текст джерелаStaszczyk, Artur. "European Parliament Position on EU Cyber Security and Defense Policy." Reality of Politics 10, no. 1 (March 31, 2019): 122–33. http://dx.doi.org/10.15804/rop201908.
Повний текст джерелаUkhanova, Erkeley. "Cybersecurity and cyber defence strategies of Japan." SHS Web of Conferences 134 (2022): 00159. http://dx.doi.org/10.1051/shsconf/202213400159.
Повний текст джерелаTkach, Yuliia. "CONCEPTUAL MODEL OF CYBER SPACE SECURITY." Technical Sciences and Technologies, no. 4(22) (2020): 96–108. http://dx.doi.org/10.25140/2411-5363-2020-4(22)-96-108.
Повний текст джерелаSebekin, S. "Choosing between Persistent Engagement and Deterrence in the American Cyber security Strategy." International Trends / Mezhdunarodnye protsessy 18, no. 3 (2020): 96–125. http://dx.doi.org/10.17994/it.2020.18.3.62.3.
Повний текст джерелаKosiński, Jerzy, Tomasz Gontarz, and Robert Kośla. "Cybersecurity and the Handling of Cyber Incidents." Internal Security 10, no. 2 (September 16, 2019): 107–28. http://dx.doi.org/10.5604/01.3001.0013.4219.
Повний текст джерелаNobles, Calvin. "Disrupting the U.S. National Security Through Financial Cybercrimes." International Journal of Hyperconnectivity and the Internet of Things 3, no. 1 (January 2019): 1–21. http://dx.doi.org/10.4018/ijhiot.2019010101.
Повний текст джерела