Journal articles on the topic 'Cyber deal'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cyber deal.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Kohrs, Jens. "XM Cyber: Sanas Cyber-Deal mit Schwarz Digits." kma - Klinik Management aktuell 30, no. 02/03 (2025): 72–73. https://doi.org/10.1055/a-2547-7046.
Full textSeleman, Yasser. "Cyber security Crimes, weaknesses, and modern practical applications in solution." International Journal of Computers and Informatics 4, no. 2 (2025): 21–39. https://doi.org/10.59992/ijci.2025.v4n2p2.
Full textStraub, PhD, Jeremy. "Cyber-mitigation: Cybersecurity emergency management." Journal of Emergency Management 18, no. 6 (2020): 463–73. http://dx.doi.org/10.5055/jem.2020.0517.
Full textGasm Elseid, Mohamed Osman Mohamed Gasm Elseid. "Technical and Procedural Measures to Protect Against Modern Cyber Breaches and Attacks." East Journal of Applied Science 1, no. 3 (2025): 16–22. https://doi.org/10.63496/ejas.vol1.iss3.95.
Full textAslam, Sibtain Bin, Moazzam Ali Malik, and Muhammad Arif Khan. "Gender and Cyber Communication: A Systematic Literature Review of Challenges Faced by Women in Pakistan." Global Language Review VIII, no. I (2023): 174–83. http://dx.doi.org/10.31703/glr.2023(viii-i).17.
Full textPutra, Tommy Mandala, I. Wayan Midhio, and Deni D.A.R. "The Challenges of Civil-Military Cooperation in The Face of Cyber Threats in Indonesia." International Journal of Research and Innovation in Social Science 06, no. 02 (2022): 471–74. http://dx.doi.org/10.47772/ijriss.2022.6221.
Full textGao, Chungang, Yongjie Wang, and Xinli Xiong. "A Cyber Deception Defense Method Based on Signal Game to Deal with Network Intrusion." Security and Communication Networks 2022 (March 18, 2022): 1–17. http://dx.doi.org/10.1155/2022/3949292.
Full textLefèvre, Claude, Muhsin Tamturk, Sergey Utev, and Marco Carenzo. "Cyber Risk in Insurance: A Quantum Modeling." Risks 12, no. 5 (2024): 83. http://dx.doi.org/10.3390/risks12050083.
Full textJaipal. "A STUDY ABOUT GROWING TREND OF CYBER-CRIME AND VARIOUS STRATEGIES TO DEAL WITH IT IN INDIAN PERSPECTIVE." International Journal of Current Research and Modern Education (IJCRME) 7, no. 2 (2022): 51–53. https://doi.org/10.5281/zenodo.8073660.
Full textGrabosky, Peter. "Requirements of prosecution services to deal with cyber crime." Crime, Law and Social Change 47, no. 4-5 (2007): 201–23. http://dx.doi.org/10.1007/s10611-007-9069-1.
Full textDewi, Maharani Chandra. "Cyber Espionage in National and Global Perspective: How Indonesia Deal with this issue?" International Law Discourse in Southeast Asia 1, no. 1 (2022): 1–22. http://dx.doi.org/10.15294/ildisea.v1i1.56874.
Full textAwan, Jawad Hussain, Shahzad Memon, and Fateh Muhammad Burfat. "Role of Cyber Law and Mitigation Strategies in Perspective of Pakistan to Cope Cyber Threats." International Journal of Cyber Warfare and Terrorism 9, no. 2 (2019): 29–38. http://dx.doi.org/10.4018/ijcwt.2019040103.
Full textWibowo, Antonius PS. "Cyber Bullying Among Law Student: How They Deal With It, Understand and Apply The Law." SHS Web of Conferences 54 (2018): 07005. http://dx.doi.org/10.1051/shsconf/20185407005.
Full textJuneja, Sapna, Mamta Gahlan, Gaurav Dhiman, and Sandeep Kautish. "Futuristic Cyber-Twin Architecture for 6G Technology to Support Internet of Everything." Scientific Programming 2021 (October 6, 2021): 1–7. http://dx.doi.org/10.1155/2021/9101782.
Full textMarotta, A., F. Martinelli, S. Nanni, A. Orlando, and A. Yautsiukhin. "Cyber-Insurance Survey." Computer Science Review 24, May 2017 (2017): 35–61. https://doi.org/10.1016/j.cosrev.2017.01.001.
Full textKurebwa, Jeffrey. "Understanding Cyber Security." International Journal of Systems and Service-Oriented Engineering 11, no. 1 (2021): 43–55. http://dx.doi.org/10.4018/ijssoe.2021010104.
Full textChen, Jian, Mohamed A. Mohamed, Udaya Dampage, et al. "A Multi-Layer Security Scheme for Mitigating Smart Grid Vulnerability against Faults and Cyber-Attacks." Applied Sciences 11, no. 21 (2021): 9972. http://dx.doi.org/10.3390/app11219972.
Full textSaputri, Dessy Permatasari, Surryanto D. W., and Helda Risman. "The Indonesian Cyber Diplomacy: ASEAN-Japan Online Cyber Exercise." Technium Social Sciences Journal 9 (June 12, 2020): 453–64. http://dx.doi.org/10.47577/tssj.v9i1.911.
Full textWardana, Achmad, Gunaryo Gunaryo, and Y. H. Yogaswara. "Development of Cyber Weapons to Improve Indonesia's Cyber Security." Journal of Sosial Science 3, no. 3 (2022): 453–59. http://dx.doi.org/10.46799/jss.v3i3.334.
Full textKashyap, Anil K., and Anne Wetherilt. "Some Principles for Regulating Cyber Risk." AEA Papers and Proceedings 109 (May 1, 2019): 482–87. http://dx.doi.org/10.1257/pandp.20191058.
Full textAjitha, P., Malemarpuram Chaitanya Sai, Dheeraj, and A. Sivasangari. "A Joint Optimization Approach to Security- and Insurance Management System on Cloud." Journal of Computational and Theoretical Nanoscience 17, no. 11 (2020): 4944–48. http://dx.doi.org/10.1166/jctn.2020.9245.
Full textErrakot, Saran, and Rahoof VK. "Cyber bullying: A Need for Separate Provision in Indian Law Saran." GLS Law Journal 5, no. 1 (2023): 38–45. http://dx.doi.org/10.69974/glslawjournal.v5i1.81.
Full textSaenko, M. I., E. A. Savela, and Y. Y. Topolyansky. "International experience against cyber crime and cyber crime." Uzhhorod National University Herald. Series: Law, no. 64 (August 14, 2021): 386–91. http://dx.doi.org/10.24144/2307-3322.2021.64.71.
Full textKim, Jin-Hee. "Reviewing the New Deal Cultural Policy: Focusing on the Federal One." Korea Association of World History and Culture 61 (December 30, 2021): 257–81. http://dx.doi.org/10.32961/jwhc.2021.12.61.257.
Full textWeyns, Danny, Jesper Andersson, Mauro Caporuscio, Francesco Flammini, Andreas Kerren, and Welf Löwe. "A Research Agenda for Smarter Cyber-Physical Systems." Journal of Integrated Design and Process Science 25, no. 2 (2022): 27–47. http://dx.doi.org/10.3233/jid210010.
Full textDixit, Ms Keerti. "Attack Taxonomy for Cyber-Physical System." International Journal for Research in Applied Science and Engineering Technology 10, no. 1 (2022): 194–200. http://dx.doi.org/10.22214/ijraset.2022.39734.
Full textMagliulo, Antonio. "Cyber Security and Tourism Competitiveness." European Journal of Tourism, Hospitality and Recreation 7, no. 2 (2016): 128–34. http://dx.doi.org/10.1515/ejthr-2016-0015.
Full textMahboob, Syed Mohaddas, Syed Shair Abbas, and Iftikhar Ahmed Shaheen. "ADAPTING TO CYBERSECURITY CHALLENGES: ASSESSING THE EFFECTIVENESS OF INTERNATIONAL LAW AGAINST CYBER TERRORISM." Journal of Social Research Development 4, no. 4 (2023): 669–85. http://dx.doi.org/10.53664/jsrd/04-04-2023-02-669-685.
Full textPranav, Choudhary. "AI-BASED CYBER CRIMES AND CYBER REGULATIONS: ISSUES AND CHALLENGES." Indian Journal of Law and Society I, no. 8 (2024): 92–110. https://doi.org/10.5281/zenodo.10644601.
Full textTörngren, Martin, and Paul Grogan. "How to Deal with the Complexity of Future Cyber-Physical Systems?" Designs 2, no. 4 (2018): 40. http://dx.doi.org/10.3390/designs2040040.
Full textSangsoo Lim. "How to deal with Cyber-bullying in terms of Moral Education." Journal of Ethics 1, no. 81 (2011): 291–316. http://dx.doi.org/10.15801/je.1.81.201106.291.
Full textDwi Hastri, Evi. "Cyber Espionage Sebagai Ancaman Terhadap Pertahanan Dan Keamanan Negara Indonesia." Law & Justice Review Journal 1, no. 1 (2021): 12–25. http://dx.doi.org/10.11594/lrjj.01.01.03.
Full textAththaariq Rizki. "UTILIZATION OF THE SEMESTA DEFENSE CONCEPT IN FACING SIBER ATTACKS DURING THE COVID-19 PANDEMIC IN INDONESIA." Edukasi IPS 5, no. 2 (2021): 18–26. http://dx.doi.org/10.21009/eips.005.02.03.
Full textKhalaf, Meaad Ali, and Amani Steiti. "Artificial Intelligence Predictions in Cyber Security: Analysis and Early Detection of Cyber Attacks." Babylonian Journal of Machine Learning 2024 (May 9, 2024): 63–68. http://dx.doi.org/10.58496/bjml/2024/006.
Full textWarren, Matthew, and Shona Leitch. "Protection of Australia in the Cyber Age." International Journal of Cyber Warfare and Terrorism 1, no. 1 (2011): 35–40. http://dx.doi.org/10.4018/ijcwt.2011010104.
Full textSaputra, Rodhi Agung, Rinaldy Amrullah, Agus Triono, and Bonifa Refsi. "Management of Improvement of Cyber Crime at the Time of the COVID-19 Pandemic Happening Restorative Justice." Scholars International Journal of Law, Crime and Justice 5, no. 7 (2022): 286–93. http://dx.doi.org/10.36348/sijlcj.2022.v05i07.006.
Full textAl moussawi, Zainab Abad Alrada. "The Role of Cybersecurity in Facing Technological Challenges in Tourism Companies in Baghdad." International journal of tourism and hospitality management 04, no. 01 (2024): 17–36. http://dx.doi.org/10.55640/ijthm-04-01-01.
Full textLeenen, Louise, and Thomas Meyer. "Semantic Technologies and Big Data Analytics for Cyber Defence." International Journal of Cyber Warfare and Terrorism 6, no. 3 (2016): 53–64. http://dx.doi.org/10.4018/ijcwt.2016070105.
Full textSianturi, Samuel Mangara. "Indonesian Defense Diplomacy in Achieving Cyber Security Through ADMM-Plus 2014-2019." LITERATUS 3, no. 2 (2021): 152–58. http://dx.doi.org/10.37010/lit.v3i2.300.
Full textLi, Xingan. "A Review of Motivations of Illegal Cyber Activities." Kriminologija & socijalna integracija 25, no. 1 (2017): 110–26. http://dx.doi.org/10.31299/ksi.25.1.4.
Full textR. Asokan. "Role of Cyber Twin Mobile Networks in Digital Communication." December 2022 4, no. 4 (2023): 277–87. http://dx.doi.org/10.36548/jsws.2022.4.006.
Full textOgîgău-Neamțiu, Florin, and Horațiu Moga. "A Cyber Threat Model of a Nation Cyber Infrastructure Based on Goel-Okumoto Port Approach." Land Forces Academy Review 23, no. 1 (2018): 75–87. http://dx.doi.org/10.2478/raft-2018-0010.
Full textRamadhianto, Rizky, Tahan Samuel Lumban Toruan, Susaningtyas Nefo Handayani Kertopati, and Hikmat Zakky Almubaroq. "Analysis of presidential regulations concerning cyber security to bolster defense policy management." Defense and Security Studies 4 (October 4, 2023): 84–93. http://dx.doi.org/10.37868/dss.v4.id244.
Full textRosyidah, Fifti Imro’atur, Susilo Purwati, and Nurul Muzayyanah. "Improving Adolescent knowledge to Prevent Cyber Bullying through Psychoeducation." International Journal of Research and Innovation in Social Science VII, no. XI (2023): 399–408. http://dx.doi.org/10.47772/ijriss.2023.7011031.
Full textFirkhan Ali Hamid Ali, Mohd Khairul Amin Mohd Sukri, Mohd Zalisham Jali, Muhammad Al-Fatih, and Mohd Azhari Mohd Yusof. "Web-Based Reporting Vulnerabilities System for Cyber Security Maintenance." Journal of Advanced Research in Applied Sciences and Engineering Technology 29, no. 3 (2023): 198–205. http://dx.doi.org/10.37934/araset.29.3.198205.
Full textSpencer, Angela D. "Cyber Science: Revolutionizing Computer Science in the Digital Age." Cybersecurity and Innovative Technology Journal 3, no. 1 (2025): 18–29. https://doi.org/10.53889/citj.v3i1.645.
Full textWrede, Dirk, Tino Stegen, and Johann-Matthias Graf von der Schulenburg. "Affirmative and silent cyber coverage in traditional insurance policies: Qualitative content analysis of selected insurance products from the German insurance market." Geneva Papers on Risk and Insurance - Issues and Practice 45, no. 4 (2020): 657–89. http://dx.doi.org/10.1057/s41288-020-00183-6.
Full textRajeyyagari, Sivaram, and Abdullah S. Alotaibi. "A study on cyber-crimes, threats, security and its emerging trends on latest technologies: influence on the Kingdom of Saudi Arabia." International Journal of Engineering & Technology 7, no. 2.3 (2018): 54. http://dx.doi.org/10.14419/ijet.v7i2.3.9969.
Full textLi, Guangjun, Preetpal Sharma, Lei Pan, Sutharshan Rajasegarar, Chandan Karmakar, and Nicholas Patterson. "Deep learning algorithms for cyber security applications: A survey." Journal of Computer Security 29, no. 5 (2021): 447–71. http://dx.doi.org/10.3233/jcs-200095.
Full textCrovini, Chiara, and Pier Luigi Marchini. "Managing cyber risk in the financial sector: Insights from a case study." FINANCIAL REPORTING, no. 1 (July 2023): 97–125. http://dx.doi.org/10.3280/fr2023-001004.
Full text