Zeitschriftenartikel zum Thema „ENISA“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "ENISA" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Štitilis, Darius, Irmantas Rotomskis, Marius Laurinaitis, Sergiy Nadvynychnyy, and Nadiya Khorunzhak. "National cyber security strategies: management, unification and assessment." Independent Journal of Management & Production 11, no. 9 (2020): 2341. http://dx.doi.org/10.14807/ijmp.v11i9.1431.
Der volle Inhalt der QuelleMcKenna, Brian. "ENISA set to join Internet governance debate." Computer Fraud & Security 2004, no. 10 (2004): 1. http://dx.doi.org/10.1016/s1361-3723(04)00115-0.
Der volle Inhalt der QuelleAditya Putra, Fandi. "Pembentukan Ekosistem Local Government Information Sharing and Analysis Center (LocalGov-ISAC) dengan Toolkit ENISA ISAC in a Box pada Sektor Pemerintah Daerah Indonesia." Info Kripto 16, no. 3 (2022): 95–102. http://dx.doi.org/10.56706/ik.v16i3.58.
Der volle Inhalt der QuelleTombak, Mari-Liis, Björn-Erik Zetterman, and Ulla Pirita Tapaninen. "Cybersecurity Risks at Port." Transport and Telecommunication Journal 26, no. 3 (2025): 276–91. https://doi.org/10.2478/ttj-2025-0021.
Der volle Inhalt der QuellePaskauskas, R. Andrew. "ENISA: 5G design and architecture of global mobile networks; threats, risks, vulnerabilities; cybersecurity considerations." Open Research Europe 2 (November 22, 2022): 125. http://dx.doi.org/10.12688/openreseurope.15219.1.
Der volle Inhalt der QuellePaskauskas, R. Andrew. "ENISA: 5G design and architecture of global mobile networks; threats, risks, vulnerabilities; cybersecurity considerations." Open Research Europe 2 (March 29, 2023): 125. http://dx.doi.org/10.12688/openreseurope.15219.2.
Der volle Inhalt der QuellePaskauskas, R. Andrew. "ENISA: 5G design and architecture of global mobile networks; threats, risks, vulnerabilities; cybersecurity considerations." Open Research Europe 2 (May 24, 2023): 125. http://dx.doi.org/10.12688/openreseurope.15219.3.
Der volle Inhalt der QuelleOmeragic, Jasmin, Teufik Goletic, Adis Softic, et al. "First detection of Echinococcus multilocularis in Bosnia and Herzegovina." International Journal for Parasitology: Parasites and Wildlife 19 (December 31, 2022): 269–72. https://doi.org/10.1016/j.ijppaw.2022.11.005.
Der volle Inhalt der QuelleGarcía Garrido, Sebastián. "Diseño Grandes Éxitos: Los hits de venta del diseño." i+Diseño. Revista Científico-Académica Internacional de Innovación, Investigación y Desarrollo en Diseño 4 (January 9, 2011): 96–107. http://dx.doi.org/10.24310/idiseno.2011.v4i.12667.
Der volle Inhalt der QuelleSamonek, Aleksandra. "What Is the Future of European Cyber Security? Three Principles of European Cooperation and the Hybrid Joint Strategy of Cyber Defence." Studia Europejskie - Studies in European Affairs 24, no. 2 (2020): 43–60. http://dx.doi.org/10.33067/se.2.2020.3.
Der volle Inhalt der QuellePeliukh, O. I., M. V. Yesina, and D. Yu Holubnychyi. "CERT-UA assessment based on the CSIRT ENISA Maturity Model." Radiotekhnika, no. 213 (June 16, 2023): 41–48. http://dx.doi.org/10.30837/rt.2023.2.213.04.
Der volle Inhalt der QuelleLiu, Chiang Lung, Wei Hsiu Chen, and Der Kuo Tung. "Identification of Critical Security Issues for Cloud Computing." Applied Mechanics and Materials 145 (December 2011): 272–76. http://dx.doi.org/10.4028/www.scientific.net/amm.145.272.
Der volle Inhalt der QuelleWellerdt, Alexander. "Entwicklung eines europäischen Agentur(un)wesens im Energiebinnenmarkt? – Handeln der ACER auf Messers Schneide im Lichte der EuGH-Rechtsprechung." Europarecht 56, no. 3 (2021): 292–306. http://dx.doi.org/10.5771/0531-2485-2021-3-292.
Der volle Inhalt der QuellePopescu, Florin, George Bucăţa, and Sorin Pistol. "Quantum Internet and Security of Military Communications." Land Forces Academy Review 26, no. 4 (2021): 293–98. http://dx.doi.org/10.2478/raft-2021-0038.
Der volle Inhalt der QuelleENNS-BRAY, William S., and Kim ROCHAT. "Medical Device Regulation and Cybersecurity: Achieving ‘Secure by Design’ for Regulatory Compliance." International Journal of Information Security and Cybercrime 9, no. 2 (2020): 12–17. http://dx.doi.org/10.19107/ijisc.2020.02.02.
Der volle Inhalt der QuelleАндрущак, І., В. Марценюк, I. Андрощук, В. Чудовець, and М. Потейчук. "CLOUD COMPUTING AND ANALYSIS FEATURES OF CLOUD INFORMATION SECURITY." КОМП’ЮТЕРНО-ІНТЕГРОВАНІ ТЕХНОЛОГІЇ: ОСВІТА, НАУКА, ВИРОБНИЦТВО, no. 37 (December 28, 2019): 5–9. http://dx.doi.org/10.36910/6775-2524-0560-2019-37-1.
Der volle Inhalt der QuellePispa, Arttu, and Kimmo Halunen. "Comprehensive Artificial Intelligence Vulnerability Taxonomy." European Conference on Cyber Warfare and Security 23, no. 1 (2024): 379–87. http://dx.doi.org/10.34190/eccws.23.1.2157.
Der volle Inhalt der QuelleSerrano, Héctor, and Javier Esteban. "Sueños de un grifo. Diseño con alma de agua." i+Diseño. Revista Científico-Académica Internacional de Innovación, Investigación y Desarrollo en Diseño 7 (April 8, 2012): 101–4. http://dx.doi.org/10.24310/idiseno.2012.v7i.12631.
Der volle Inhalt der QuelleZACHARIS, Alexandros, Eloise JABES, Ifigenia LELLA, and Evangelos REKLEITIS. "Cyber Awareness Exercises: Virtual vs On-site Participation & the Hybrid Approach." International Journal of Information Security and Cybercrime 10, no. 2 (2021): 31–36. http://dx.doi.org/10.19107/ijisc.2021.02.04.
Der volle Inhalt der QuelleMartí Pellón, José. "Asimetría informativa y financiación de pymes: el papel de los préstamos participativos." ICE, Revista de Economía, no. 904 (September 3, 2018): 71–83. http://dx.doi.org/10.32796/ice.2018.904.6665.
Der volle Inhalt der QuelleGarcia, Bruno. "Information and security in cyberspace: The influence of globalization on the intensification of risks and threats in the last decade." Ciências e Políticas Públicas / Public Sciences & Policies 7, no. 1 (2021): 213–31. http://dx.doi.org/10.33167/2184-0644.cpp2021.vviin1/pp.213-231.
Der volle Inhalt der QuelleGarcia, Bruno. "Informação e Segurança no Ciberespaço: A influência da globalização na intensificação de riscos e ameaças na última década." Ciências e Políticas Públicas / Public Sciences & Policies 7, no. 1 (2021): 193–212. http://dx.doi.org/10.33167/2184-0644.cpp2021.vviin1/pp.193-212.
Der volle Inhalt der QuelleWiewiórowski, Wojciech, and Juhan Lepassaar. "Pairing up Cybersecurity and Data Protection efforts: EDPS and ENISA sign Memorandum of Understanding." Datenschutz und Datensicherheit - DuD 47, no. 2 (2023): 68. http://dx.doi.org/10.1007/s11623-023-1718-8.
Der volle Inhalt der QuelleGonçalves, Emanuel. "Comprehensive Analysis for Cybersecurity and Interoperability in Portuguese Healthcare Systems Under NIS2." ARIS2 - Advanced Research on Information Systems Security 5, no. 1 (2025): 38–56. https://doi.org/10.56394/aris2.v5i1.59.
Der volle Inhalt der QuelleŠepec, Miha, and Maša Kočivnik. "Combatting Cyberwarfare Crimes in the European Union." European Integration Studies 20, no. 2 (2024): 409–32. https://doi.org/10.46941/2024.2.16.
Der volle Inhalt der QuelleБедаев, А. И. "МЕЖДУНАРОДНАЯ ИНФОРМАЦИОННАЯ БЕЗОПАСНОСТЬ В РАБОЧЕЙ ПОВЕСТКЕ ЕВРОСОЮЗА: УГРОЗЫ, НАПРАВЛЕНИЯ РАБОТЫ И ПРОБЛЕМЫ". Caspium Securitatis Journal of Caspian Safety & Security 4, № 1 (2024): 11–22. https://doi.org/10.54398/2713-024x.2024.4.1.001.
Der volle Inhalt der QuelleSzádeczky, Tamás. "Cybersecurity Authorities and Related Policies in the EU and Hungary." Central and Eastern European eDem and eGov Days 331 (July 12, 2018): 287–99. http://dx.doi.org/10.24989/ocg.v331.24.
Der volle Inhalt der QuelleSmith, Robert. "Reviewer Acknowledgements." Journal of Education and Training Studies 4, no. 3 (2016): 235. http://dx.doi.org/10.11114/jets.v4i3.1425.
Der volle Inhalt der QuelleThanvi, Irfan Ali. "Legal Challenges in Securing Critical Information Infrastructure Protection (CIIP): An American Empathy." Cyber Law Reporter 02, no. 01 (2023): 60–86. http://dx.doi.org/10.55662/cylr.2023.2101.
Der volle Inhalt der QuelleDI FRANCO, Fabio, Konstantinos PAPADATOS, and Konstantinos RANTOS. "Re-Visiting Cyber Security Training in the COVID-19 Era." International Journal of Information Security and Cybercrime 10, no. 2 (2021): 16–20. http://dx.doi.org/10.19107/ijisc.2021.02.02.
Der volle Inhalt der QuelleSingh, Jitendra, and Kamlesh Kumar Raghuvanshi. "Regulations and Standards in Public Cloud." Journal of Information Technology Research 13, no. 3 (2020): 21–36. http://dx.doi.org/10.4018/jitr.2020070102.
Der volle Inhalt der QuelleSmith, Robert. "Reviewer Acknowledgements." Journal of Education and Training Studies 4, no. 5 (2016): 262. http://dx.doi.org/10.11114/jets.v4i5.1582.
Der volle Inhalt der QuelleSmith, Robert. "Reviewer Acknowledgements." Journal of Education and Training Studies 4, no. 6 (2016): 241. http://dx.doi.org/10.11114/jets.v4i6.1645.
Der volle Inhalt der QuelleBamigbade, Oluwatobi. "Assessment of Cost-Benefit Dynamics of Cybersecurity Compliance Investments: A Multi-Sectoral Analysis Across Financial, Energy and Intelligence Industries." Journal of Energy Research and Reviews 17, no. 7 (2025): 86–105. https://doi.org/10.9734/jenrr/2025/v17i7435.
Der volle Inhalt der QuelleRohith, Vallabhaneni, and Veeramachaneni Vinod. "Threat Modeling for Enhanced Security in the Healthcare Industry with a Focus on Mobile Health and IoT." Engineering and Technology Journal 9, no. 10 (2024): 5329–31. https://doi.org/10.5281/zenodo.13923134.
Der volle Inhalt der QuelleAditya Putra, Fandi, and Farouq Aferudin. "Pengembangan Financial Service Information Sharing and Analysis Center (FS-ISAC) di Indonesia dengan Pendekatan ENISA ISAC in a Box." Info Kripto 16, no. 2 (2022): 79–86. http://dx.doi.org/10.56706/ik.v16i2.49.
Der volle Inhalt der QuelleCruz, Cayetano, and Jesús Ángel Prieto. "Diseñando con las manos: proyecto y proceso en la artesanía del s. XXI." i+Diseño. Revista Científico-Académica Internacional de Innovación, Investigación y Desarrollo en Diseño 5 (April 7, 2011): 138–40. http://dx.doi.org/10.24310/idiseno.2011.v5i.12652.
Der volle Inhalt der QuelleAnanda, Safrida, Ika Putranti, and Andi Dir. "ANALYSIS OF THE EU CYBERSECURITY ACT UNDER THE THEORY OF NEOLIBERAL INSTITUTIONALISM." Arena Hukum 15, no. 1 (2022): 176–99. http://dx.doi.org/10.21776/ub.arenahukum.2022.01501.9.
Der volle Inhalt der QuelleMeily, Meily. "XYZ Web App Information Security Management Risk Assessment." ACMIT Proceedings 1, no. 1 (2014): 59–89. http://dx.doi.org/10.33555/acmit.v1i1.19.
Der volle Inhalt der QuelleSmith, Robert. "Reviewer Acknowledgements." Journal of Education and Training Studies 4, no. 4 (2016): 295. http://dx.doi.org/10.11114/jets.v4i4.1484.
Der volle Inhalt der QuelleСавчук, Сергій Олександрович. "Виклики та можливості інтеграції України в систему кібербезпеки ЄС". Економіка, управління та адміністрування, № 2(108) (1 серпня 2024): 198–203. https://doi.org/10.26642/ema-2024-2(108)-198-203.
Der volle Inhalt der QuelleDe Barros, Martina. "Cybersecurity in Mozambique: Status and Challenges." European Conference on Cyber Warfare and Security 22, no. 1 (2023): 553–58. http://dx.doi.org/10.34190/eccws.22.1.1194.
Der volle Inhalt der QuelleGRAMMATOPOULOS, Athanasios Vasileios, and Fabio DI FRANCO. "Building a Career Path Through Training Programmes Using ECSF." International Journal of Information Security and Cybercrime 12, no. 1 (2023): 11–17. http://dx.doi.org/10.19107/ijisc.2023.01.01.
Der volle Inhalt der QuelleMartinez, Cristina, Iñaki Etxaniz, Alberto Molinuevo, and Juncal Alonso. "MEDINA Catalogue of Cloud Security controls and metrics: Towards Continuous Cloud Security compliance." Open Research Europe 4 (April 24, 2024): 90. http://dx.doi.org/10.12688/openreseurope.16669.1.
Der volle Inhalt der QuelleИманбаев, Азамат, Сахыбай Тынымбаев, Роман Одарченко та Ерсултан Валихан. "АНАЛИЗ МЕХАНИЗМОВ БЕЗОПАСНОСТИ СЕТЕЙ СОТОВОЙ СВЯЗИ 5G". Вестник Алматинского университета энергетики и связи 1, № 64 (2024): 69–85. http://dx.doi.org/10.51775/2790-0886_2024_64_1_69.
Der volle Inhalt der QuelleGherghin, Claudia-Anamaria. "Public Policies in Data Security in the European Union: A Literature Review." TechHub Journal 3 (December 10, 2024): 74–80. https://doi.org/10.47577/techhub.v3i.128.
Der volle Inhalt der QuelleBarzola-Plúas, Yorly Geomar, Delia Paulina Samaniego-Quiguiri, Ronny Alejandro Núñez-Ribadeneyra, and Diego Marcelo Bonilla-Morejón. "Protección de datos personales en la era de la computación cuántica y sus desafíos legales." Revista Científica Ciencia y Método 1, no. 3 (2023): 45–57. https://doi.org/10.55813/gaea/rcym/v1/n3/19.
Der volle Inhalt der QuelleMackita, Masky, Soo-Young Shin, and Tae-Young Choe. "ERMOCTAVE: A Risk Management Framework for IT Systems Which Adopt Cloud Computing." Future Internet 11, no. 9 (2019): 195. http://dx.doi.org/10.3390/fi11090195.
Der volle Inhalt der QuelleČelik, Petar. "Institutional Measures for Increasing the Cyber Security for Business in the European Union." Economic Themes 57, no. 3 (2019): 351–64. http://dx.doi.org/10.2478/ethemes-2019-0020.
Der volle Inhalt der QuelleSmith, Robert. "Reviewer Acknowledgements." Journal of Education and Training Studies 3, no. 6 (2015): 298. http://dx.doi.org/10.11114/jets.v3i6.1178.
Der volle Inhalt der Quelle