Journal articles on the topic 'Cyber exercises'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cyber exercises.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Aoyama, Tomomi, Toshihiko Nakano, Ichiro Koshijima, Yoshihiro Hashimoto, and Kenji Watanabe. "On the Complexity of Cybersecurity Exercises Proportional to Preparedness." Journal of Disaster Research 12, no. 5 (2017): 1081–90. http://dx.doi.org/10.20965/jdr.2017.p1081.
Full textRoşu, Livia, and Georgiana Subaşu. "Digital Forensics in Cyber Security Exercises." Journal of Military Technology 1, no. 1 (2018): 13–18. http://dx.doi.org/10.32754/jmt.2018.1.02.
Full textHallaq, Bil, Andrew Nicholson, Richard Smith, et al. "A Novel Hybrid Cyber Range for Security Exercises on Cyber-Physical Systems." International Journal of Smart Security Technologies 8, no. 1 (2021): 16–34. http://dx.doi.org/10.4018/ijsst.2021010102.
Full textAbbott, Robert G., Jonathan McClain, Benjamin Anderson, Kevin Nauer, Austin Silva, and Chris Forsythe. "Log Analysis of Cyber Security Training Exercises." Procedia Manufacturing 3 (2015): 5088–94. http://dx.doi.org/10.1016/j.promfg.2015.07.523.
Full textKarjalainen, Mika, and Tero Kokkonen. "Review of Pedagogical Principles of Cyber Security Exercises." Advances in Science, Technology and Engineering Systems Journal 5, no. 5 (2020): 592–600. http://dx.doi.org/10.25046/aj050572.
Full textConte de Leon, Daniel, Christopher E. Goes, Michael A. Haney, and Axel W. Krings. "ADLES: Specifying, deploying, and sharing hands-on cyber-exercises." Computers & Security 74 (May 2018): 12–40. http://dx.doi.org/10.1016/j.cose.2017.12.007.
Full textOšlejšek, Radek, and Tomáš Pitner. "Optimization of Cyber Defense Exercises Using Balanced Software Development Methodology." International Journal of Information Technologies and Systems Approach 14, no. 1 (2021): 136–55. http://dx.doi.org/10.4018/ijitsa.2021010108.
Full textKuusisto, Tuija, and Rauno Kuusisto. "Strategic Communication for Supporting Cyber-Security." International Journal of Cyber Warfare and Terrorism 3, no. 3 (2013): 72–79. http://dx.doi.org/10.4018/ijcwt.2013070105.
Full textKonstantinou, Charalambos. "Cyber-Physical Systems Security Education Through Hands-on Lab Exercises." IEEE Design & Test 37, no. 6 (2020): 47–55. http://dx.doi.org/10.1109/mdat.2020.3005365.
Full textAndreolini, Mauro, Vincenzo Giuseppe Colacino, Michele Colajanni, and Mirco Marchetti. "A Framework for the Evaluation of Trainee Performance in Cyber Range Exercises." Mobile Networks and Applications 25, no. 1 (2019): 236–47. http://dx.doi.org/10.1007/s11036-019-01442-0.
Full textGranåsen, Magdalena, and Dennis Andersson. "Measuring team effectiveness in cyber-defense exercises: a cross-disciplinary case study." Cognition, Technology & Work 18, no. 1 (2015): 121–43. http://dx.doi.org/10.1007/s10111-015-0350-2.
Full textSingh Rao, Harshita. "CYBER CRIME IN BANKING SECTOR." International Journal of Research -GRANTHAALAYAH 7, no. 1 (2019): 148–61. http://dx.doi.org/10.29121/granthaalayah.v7.i1.2019.1043.
Full textWang, Lixin, Jianhua Yang, and Peng-Jun Wan. "Educational modules and research surveys on critical cybersecurity topics." International Journal of Distributed Sensor Networks 16, no. 9 (2020): 155014772095467. http://dx.doi.org/10.1177/1550147720954678.
Full textHadaegh, Bahee, and Venus Torabi. "Borges’s “The Intruder” Remediated: Adaptation to Silver/Cyber Screens." Khazar Journal of Humanities and Social Sciences 21, no. 3 (2018): 136–53. http://dx.doi.org/10.5782/2223-2621.2018.21.3.136.
Full textSolansky, Stephanie T., and Tammy E. Beck. "Enhancing Community Safety and Security Through Understanding Interagency Collaboration in Cyber-Terrorism Exercises." Administration & Society 40, no. 8 (2009): 852–75. http://dx.doi.org/10.1177/0095399708326345.
Full textRichter, Maximilian, Klaus Schwarz, and Reiner Creutzburg. "Conception and Implementation of Professional Laboratory Exercises in the field of ICS/SCADA Security Part II: Red Teaming and Blue Teaming." Electronic Imaging 2021, no. 3 (2021): 74–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.3.mobmu-074.
Full textSchwarz, Klaus, Franziska Schwarz, and Reiner Creutzburg. "Conception and implementation of professional laboratory exercises in the field of open source intelligence (OSINT)." Electronic Imaging 2020, no. 3 (2020): 278–1. http://dx.doi.org/10.2352/issn.2470-1173.2020.3.mobmu-277.
Full textJoveda, Nahid, Md Tarek Khan, and Abhijit Pathak. "Cyber Laundering: A Threat to Banking Industries in Bangladesh: In Quest of Effective Legal Framework and Cyber Security of Financial Information." International Journal of Economics and Finance 11, no. 10 (2019): 54. http://dx.doi.org/10.5539/ijef.v11n10p54.
Full textRichter, Maximilian, Klaus Schwarz, and Reiner Creutzburg. "Conception and Implementation of Professional Laboratory Exercises in the field of ICS/SCADA Security - Part I: Fundamentals." Electronic Imaging 2021, no. 3 (2021): 73–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.3.mobmu-073.
Full textYamin, Muhammad Mudassar, Basel Katt, and Mariusz Nowostawski. "Serious games as a tool to model attack and defense scenarios for cyber-security exercises." Computers & Security 110 (November 2021): 102450. http://dx.doi.org/10.1016/j.cose.2021.102450.
Full textDemertzis, Maria, and Guntram Wolff. "Hybrid and Cyber Security Threats and the EU’s Financial System." Journal of Financial Regulation 6, no. 2 (2020): 306–16. http://dx.doi.org/10.1093/jfr/fjaa006.
Full textDayanika, J., G. Archana, K. Siva Kumar, and N. Pavani. "Early Detection of Cyber Attacks Based on Feature Selection Algorithm." Journal of Computational and Theoretical Nanoscience 17, no. 9 (2020): 4648–53. http://dx.doi.org/10.1166/jctn.2020.9293.
Full textSimon, Stephanie, and Marieke de Goede. "Cybersecurity, Bureaucratic Vitalism and European Emergency." Theory, Culture & Society 32, no. 2 (2015): 79–106. http://dx.doi.org/10.1177/0263276414560415.
Full textAmoah, Michael. "Sleight is right: Cyber control as a new battleground for African elections." African Affairs 119, no. 474 (2019): 68–89. http://dx.doi.org/10.1093/afraf/adz023.
Full textLi, Chengcheng. "Penetration Testing Curriculum Development in Practice." Journal of Information Technology Education: Innovations in Practice 14 (2015): 085–99. http://dx.doi.org/10.28945/2189.
Full textAllen, Theodore T., Olivia K. Hernandez, and Abdullah Alomair. "Optimal Off-line Experimentation for Games." Decision Analysis 17, no. 4 (2020): 277–98. http://dx.doi.org/10.1287/deca.2020.0412.
Full textRogulis, Dovydas. "The Development of the Lithuanian Armed Forces and Its Response to the Russian Conventional Threats in 2015‒2020." Jaunųjų mokslininkų darbai 51, no. 1 (2021): 48–58. http://dx.doi.org/10.15388/jmd.2021.4.
Full textKonak, Abdullah, Sadan Kulturel-Konak, Mahdi Nasereddin, and Michael R. Bartolacci. "Impact of Collaborative Work on Technology Acceptance: A Case Study from Virtual Computing." Journal of Information Technology Education: Research 16 (2017): 015–29. http://dx.doi.org/10.28945/3622.
Full textBussing, Joseph. "The Degrees of Force Exercised in the Cyber Battlespace." Connections: The Quarterly Journal 2, no. 4 (2013): 1–13. http://dx.doi.org/10.11610/connections.12.4.01.
Full textBussing, Joseph. "Степени применения силы в боевом киберпространстве". Connections: The Quarterly Journal 12, № 4 (2013): 1–16. http://dx.doi.org/10.11610/connections.rus.12.4.01.
Full textOSTERMAN, ANDREJ. "THE SLOVENIAN ARMED FORCES 15 YEARS AFTER THE REPUBLIC OF SLOVENIA JOINED NATO." CONTEMPORARY MILITARY CHALLENGES, Volume 2019 Issue 21/3 (September 3, 2019): 123–42. http://dx.doi.org/10.33179/bsv.99.svi.11.cmc.21.3.7.
Full textSaputri, Dessy Permatasari, Surryanto D. W., and Helda Risman. "The Indonesian Cyber Diplomacy: ASEAN-Japan Online Cyber Exercise." Technium Social Sciences Journal 9 (June 12, 2020): 453–64. http://dx.doi.org/10.47577/tssj.v9i1.911.
Full textWu, Zumei, Jinhui Li, and Yin-Leng Theng. "Examining the Influencing Factors of Exercise Intention Among Older Adults: A Controlled Study Between Exergame and Traditional Exercise." Cyberpsychology, Behavior, and Social Networking 18, no. 9 (2015): 521–27. http://dx.doi.org/10.1089/cyber.2015.0065.
Full textMcGloin, Rory, Kimberly Embacher-Martin, Christine Gilbert, and Jaci VanHeest. "Gearing Up for the Future of Exercise." Simulation & Gaming 51, no. 6 (2020): 819–29. http://dx.doi.org/10.1177/1046878120943253.
Full textJin, Seung-A. Annie. "Does Imposing a Goal Always Improve Exercise Intentions in Avatar-Based Exergames? The Moderating Role of Interdependent Self-Construal on Exercise Intentions and Self-Presence." Cyberpsychology, Behavior, and Social Networking 13, no. 3 (2010): 335–39. http://dx.doi.org/10.1089/cyber.2009.0186.
Full textKnoeppel, David E. "Alternative Cybex Exercise Positions." Journal of Orthopaedic & Sports Physical Therapy 7, no. 2 (1985): 73–76. http://dx.doi.org/10.2519/jospt.1985.7.2.73.
Full textAckermann, Bronwen, Roger Adams, and Elfreda Marshall. "Strength or Endurance Training for Undergraduate Music Majors at a University?" Medical Problems of Performing Artists 17, no. 1 (2002): 33–41. http://dx.doi.org/10.21091/mppa.2002.1006.
Full textBaños, Rosa M., Patricia Escobar, Ausias Cebolla, et al. "Using Virtual Reality to Distract Overweight Children from Bodily Sensations During Exercise." Cyberpsychology, Behavior, and Social Networking 19, no. 2 (2016): 115–19. http://dx.doi.org/10.1089/cyber.2015.0283.
Full textKurebwa, Jeffrey. "Understanding Cyber Security." International Journal of Systems and Service-Oriented Engineering 11, no. 1 (2021): 43–55. http://dx.doi.org/10.4018/ijssoe.2021010104.
Full textKnox, Benjamin James, Ricardo G. Lugo, Kirsi Helkala, and Stefan Sütterlin. "Slow Education and Cognitive Agility." International Journal of Cyber Warfare and Terrorism 9, no. 1 (2019): 48–66. http://dx.doi.org/10.4018/ijcwt.2019010104.
Full textWiederhold, Mark D., Megan Crisci, Vrajeshri Patel, Makoto Nonaka, and Brenda K. Wiederhold. "Physiological Monitoring During Augmented Reality Exercise Confirms Advantages to Health and Well-Being." Cyberpsychology, Behavior, and Social Networking 22, no. 2 (2019): 122–26. http://dx.doi.org/10.1089/cyber.2018.0027.
Full textLehto, Martti, Aki-Mauri Huhtinen, and Saara Jantunen. "The Open Definition of Cyber." International Journal of Cyber Warfare and Terrorism 1, no. 2 (2011): 1–9. http://dx.doi.org/10.4018/ijcwt.2011040101.
Full textZeng, Nan, Zachary Pope, and Zan Gao. "Acute Effect of Virtual Reality Exercise Bike Games on College Students' Physiological and Psychological Outcomes." Cyberpsychology, Behavior, and Social Networking 20, no. 7 (2017): 453–57. http://dx.doi.org/10.1089/cyber.2017.0042.
Full textMolis, Arūnas, Claudia Palazzo, and Kaja Ainsalu. "Mitigating Risks of Hybrid War: Search for an Effective Energy Strategyin The Baltic States." Journal on Baltic Security 4, no. 2 (2018): 23–32. http://dx.doi.org/10.2478/jobs-2018-0009.
Full textWaddell, T. Franklin, S. Shyam Sundar, and Joshua Auriemma. "Can Customizing an Avatar Motivate Exercise Intentions and Health Behaviors Among Those with Low Health Ideals?" Cyberpsychology, Behavior, and Social Networking 18, no. 11 (2015): 687–90. http://dx.doi.org/10.1089/cyber.2014.0356.
Full textMikhalevich, Ekaterina A. "The Сoncept of Сyber Sovereignty of the People’s Republic of China: Development History and Essence". RUDN Journal of Political Science 23, № 2 (2021): 254–64. http://dx.doi.org/10.22363/2313-1438-2021-23-2-254-264.
Full textOta, Yuitaka, Tomomi Aoyama, Davaaadorj Nyambayar, and Ichiro Koshijima. "Cyber incident exercise for safety protection in critical infrastructure." International Journal of Safety and Security Engineering 8, no. 2 (2018): 246–57. http://dx.doi.org/10.2495/safe-v8-n2-246-257.
Full textDutta, Avijit. "IN SEARCH FOR CYBER DEPENDENCE." International Journal of Research -GRANTHAALAYAH 7, no. 12 (2020): 1–25. http://dx.doi.org/10.29121/granthaalayah.v7.i12.2019.294.
Full textLewis, Coleen. "Social Media - Cyber trap door to defamation." Masaryk University Journal of Law and Technology 9, no. 1 (2015): 65–84. http://dx.doi.org/10.5817/mujlt2015-1-5.
Full textHelkala, Kirsi, Benjamin Knox, Øyvind Jøsok, Silje Knox, and Mass Lund. "Factors to affect improvement in cyber officer performance." Information & Computer Security 24, no. 2 (2016): 152–63. http://dx.doi.org/10.1108/ics-01-2016-0001.
Full text