Academic literature on the topic 'Cyber(in-)security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cyber(in-)security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cyber(in-)security"
NASTASIU, Cătălin-Ionuț. "CYBER SECURITY STRATEGIES IN THE INTERNET ERA." SCIENTIFIC RESEARCH AND EDUCATION IN THE AIR FORCE 18, no. 2 (June 24, 2016): 619–24. http://dx.doi.org/10.19062/2247-3173.2016.18.2.19.
Full textKothiyal, Sonakshi. "Automation in Cyber-Security." International Journal for Research in Applied Science and Engineering Technology 7, no. 5 (May 31, 2019): 581–84. http://dx.doi.org/10.22214/ijraset.2019.5098.
Full textKour, Jaspreet, M. Hanmandlu, and A. Q. Ansari. "Biometrics in Cyber Security." Defence Science Journal 66, no. 6 (October 31, 2016): 600. http://dx.doi.org/10.14429/dsj.66.10800.
Full textKondewar, Shweta Vivekananda. "Cyber Security in Healthcare." International Journal for Research in Applied Science and Engineering Technology 9, no. 3 (March 31, 2021): 145–48. http://dx.doi.org/10.22214/ijraset.2021.33159.
Full textKaur, Prof Simranpreet. "Security in Cyber Crime." International Journal for Research in Applied Science and Engineering Technology 9, no. 9 (September 30, 2021): 694–98. http://dx.doi.org/10.22214/ijraset.2021.38023.
Full textCIOACĂ, Cătălin, Alexandru BRATU, and Daniel ȘTEFĂNESCU. "THE ANALYSIS OF BENCHMARKING APPLICATION IN CYBER SECURITY." SCIENTIFIC RESEARCH AND EDUCATION IN THE AIR FORCE 19, no. 2 (July 31, 2017): 57–62. http://dx.doi.org/10.19062/2247-3173.2017.19.2.8.
Full textMaqsood, Ayesha, and Muhammad Rizwan. "Security, Trust and Privacy In Cyber (Stpc Cyber)." International Journal of Scientific and Research Publications (IJSRP) 9, no. 2 (February 18, 2019): p8682. http://dx.doi.org/10.29322/ijsrp.9.02.2019.p8682.
Full textBhargava, Rishi. "Cyber Crime And Cyber Security In Madhya Pradesh." National Journal of Environment and Scientific Research 2, no. 8 (August 22, 2021): 53. http://dx.doi.org/10.53571/njesr.2021.2.8.53-61.
Full textLehto, Martti. "The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies." International Journal of Cyber Warfare and Terrorism 3, no. 3 (July 2013): 1–18. http://dx.doi.org/10.4018/ijcwt.2013070101.
Full textPriya, Mrs A. Lakshmi, and S. Letitia. "Dual Watermarking in Cyber Security." JOURNAL OF ADVANCES IN CHEMISTRY 13, no. 10 (March 4, 2017): 5923–26. http://dx.doi.org/10.24297/jac.v13i10.5834.
Full textDissertations / Theses on the topic "Cyber(in-)security"
LOBATO, LUÍSA CRUZ. "UNRAVELING THE CYBER SECURITY MARKET: THE STRUGGLES AMONG CYBER SECURITY COMPANIES AND THE PRODUCTION OF CYBER (IN)SECURITY." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2016. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=27784@1.
Full textCONSELHO NACIONAL DE DESENVOLVIMENTO CIENTÍFICO E TECNOLÓGICO
A presente dissertação investiga o papel das companhias de segurança cibernética na produção da segurança cibernética contemporânea. A crescente pressão para securitizar o ciberespaço contribuiu para o crescimento de um lucrativo mercado voltado para a provisão de produtos e serviços para clientes comerciais e governamentais. Utilizando uma perspectiva inspirada em Bourdieu, o trabalho: analisa as condições históricas nas quais as tecnologias da informação ganharam terreno no debate de segurança; identifica as posições e investiga as práticas das companhias de segurança cibernética no campo da segurança cibernética e analisa as disputas em andamento pela produção da segurança cibernética. Abordagens voltadas ao risco são pilares na concepção e comercialização de produtos e serviços anunciados pelas companhias. Neste sentido, argumenta-se que ambas as abordagens voltadas ao risco e as práticas comerciais das companhias de segurança cibernética produzem formas específicas de segurança. O trabalho identifica três distintas formas de segurança produzidas no campo: segurança defensiva, segurança ofensiva e defesa ativa. Analisa-se as implicações de cada forma para a segurança, de um modo geral, e argumenta-se que, enquanto grande parte das companhias adota uma estratégia de defesa ativa em seus produtos e serviços, algumas tem se orientado para a adoção de medidas mais ofensivas para lidar com os atuais riscos. A análise é concluída com algumas reflexões a respeito das implicações das atuais dinâmicas do mercado de segurança cibernética para a segurança e governança da Internet.
This dissertation examines the role of cyber security companies in the production of contemporary cyber security. The increasing pressures to securitize cyberspace have contributed to the growth of a lucrative market oriented at providing cyber security products and services to commercial and government customers. Using a Bourdieu-inspired framework, the work: analyzes the historical conditions under which information technologies gained ground within security debates; identifies the positions and investigates the practices of cyber security companies within the cyber security field and analyzes the ongoing struggles for the production of cyber security. Risk-based thinking is a cornerstone of the process of conceiving and commercializing products and services advertised by companies. In this sense, it is argued that both risk-based thinking and the commercial practices of cyber security companies produce specific forms of security. The work identifies three distinct forms of security produced within the field: defensive security, offensive security and active defense. It analyzes the implications of each form to the overall security of cyberspace and argues that whilst the majority of companies adopt an active defense approach in their products and services, some of them are leaning towards more offensive solutions to deal with current risks. It concludes the analysis with some thoughts on the implications of the current dynamics of the cyber security market for security and Internet governance.
Sridharan, Venkatraman. "Cyber security in power systems." Thesis, Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/43692.
Full textPatterson, Joanna. "Cyber-Security Policy Decisions in Small Businesses." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4551.
Full textVuković, Ognjen. "Cyber-security in Smart Grid Communication and Control." Doctoral thesis, KTH, Kommunikationsnät, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-152223.
Full textQC 20140924
Dahlman, Elsa, and Karin Lagrelius. "A Game of Drones : Cyber Security in UAVs." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-259295.
Full textObemannade luftburna farkoster (OLF) blir mer vanliga allteftersom deras användningsområde utökas, vilket innebär att cybersäkerhetsaspekten behöver studeras. Detta arbete är en systematisk litteraturstudie som undersöker vilka typer av cyberattacker riktade mot drönare som är vanligast och vilka risker de medför. Attackerna i rapporten är kategoriserade med hjälp av metoden STRIDE samt efter vilka mål attackerna haft och vilken utrustning som krävs. Resultatet är att Spoofing och Denial of Service-attacker är vanligast och att de medför att attackeraren kan kapa eller krascha drönaren. Ingen svåråtkomlig utrustning krävs för någon av dessa attacktyper vilket indikerar att säkerhetsläget för civila drönare behöver förbättras.
Masonganye, James. "Analysis of cyber security in smart grid systems." Diss., University of Pretoria, 2005. http://hdl.handle.net/2263/66218.
Full textDissertation (MEng)--University of Pretoria, 2017.
Electrical, Electronic and Computer Engineering
MEng
Unrestricted
Sjöstedt, Matildha. "Monitoring of Cyber Security Exercise Environments in Cyber Ranges : with an implementation for CRATE." Thesis, Linköpings universitet, Programvara och system, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177647.
Full textLocke, Ronald Taylor. "Anomaly detection with applications in environmental and cyber security." Thesis, Boston University, 2012. https://hdl.handle.net/2144/33260.
Full textPLEASE NOTE: Boston University Libraries did not receive an Authorization To Manage form for this thesis or dissertation. It is therefore not openly accessible, though it may be available by request. If you are the author or principal advisor of this work and would like to request open access for it, please contact us at open-help@bu.edu. Thank you.
Two approaches to detecting anomalous behavior within a sequence of random observations are presented. One approach is stochastic in nature, using large deviations techniques to form a Hoeffding decision test. Scenarios in which sequential observations can be considered independent and identically distributed (iid) or adhere to a first-order Markov chain are both considered. The Markovian case is explored further and asymptotic performance results are developed for using the generalized likelihood ratio test (GLRT) to identify a Markov source. After a presentation of binary and multi-class Support Vector Machines (SVM), a deterministic anomaly detection method based on the so-called one-class SVM is also presented. The presented methodologies are then applied to detection and localization of Chemical, Biological, Radiological, or Nuclear (CBRN) events in an urban area using a network of sensors. In contrast to earlier work, these approaches do not solve an inverse dispersion problem but rely on data obtained from a simulation of the CBRN dispersion to obtain descriptors of sensor measurements under a variety of CBRN release scenarios. To assess the problem of environmental monitoring, CBRN event-free conditions are assumed to be iid and a corresponding stochastic anomaly detector is relied on to detect a CBRN event. Conditional on such an event, subsequent sensor observations are assumed to follow a Markov process. Accordingly, the presented Markov source identification methodology is used to map sensor observations to a source location chosen out of a discrete set of possible locations. A multi-class SVM approach to CBRN localization is also developed, and the two techniques are compared using three-dimensional CBRN release simulations. Also addressed is the problem of optimally placing sensors to minimize the localization probability of error. The anomaly detection approaches are then applied to detection of data exfiltration-style attempts on a network server. Two one-class SVM approaches are presented. In both, data packet transmissions are captured and compiled into network flows. In a flow-by-flow network anomaly detector, features are extracted from individual flows and their novelty is tested. If a flows features differ too greatly from nominal flow features, as determined by the SVM, that flow is declared an anomaly. In a network-wide anomaly detector, the novelty of a time sequence of flows is tested. The stochastic anomaly detectors are applied to sequences of flows as well, under the contexts of subsequent network flows either being iid or following a Markov process. These techniques are evaluated on simulated network traffic.
2031-01-01
Chivukula, Venkata Ramakrishna. "Detecting Cyber Security Anti-Patterns in System Architecture Models." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-293027.
Full textOrganisationer över hela världen har blivit måltavlor för storskaliga cyberattacker. Över tid har antalet framgångsrika attacker vuxit till en hög nivå. Som en förberedelse för dessa attacker måste organisationer testa sin infrastrukturs motståndskraft. Ett sätt att hantera risken för dessa attacker och säkerställa säkerhet är användningen av hotmodellering och attacksimuleringar. Genom hotmodellering och attacksimuleringar kan organisationer analysera egenskaperna för informationssäkerhet i sin infrastruktur och identifiera svaga punkter. Svagheterna måste sedan hanteras för att förbättra organisationens övergripande säkerhetsposition. När de modelleras kan dessa svagheter förekomma i olika former. Vissa är komponentspecifika och lokala till ett objekt i infrastrukturen. Dessa kan hanteras med hjälp av försvar som definieras i securi- CAD. Andra svagheter kan uppstå genom relationerna mellan flera objekt i infrastrukturen. Dessa kallas strukturella svagheter. Att identifiera och mildra dessa strukturella svagheter är mycket viktigt. I denna avhandling beskrivs strukturella svagheter och en katalog med svagheter har byggts upp. Vidare definieras en modell som möjliggör beskrivning av dessa svagheter och möjliggör identifiering av svagheter i securiCADmodeller. Med hjälp av beskrivningsmodellen kan alla förekomster av bristen hittas. Dessa händelser kan sedan ersättas med strukturella förbättringar. De förbättrade securiCAD-modellerna analyseras sedan. Resultaten visar att de strukturella förbättringarna är användbara för att avsevärt minska Time-To- Compromise (TTC) för viktiga tillgångar. Med hjälp av katalogen och modellen kan systemadministratörer identifiera svagheter och testa effekten av olika förbättringar i securiCAD-modellen som sedan kan tillämpas på den faktiska infrastrukturen.
Fischer, Fabian [Verfasser]. "Visual Analytics for Situational Awareness in Cyber Security / Fabian Fischer." Konstanz : Bibliothek der Universität Konstanz, 2016. http://d-nb.info/1122561830/34.
Full textBooks on the topic "Cyber(in-)security"
Shukla, Sandeep Kumar, and Manindra Agrawal, eds. Cyber Security in India. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1675-7.
Full textShen, Bazhong, Baocang Wang, Jinguang Han, and Yong Yu, eds. Frontiers in Cyber Security. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-15-0818-9.
Full textXu, Guangquan, Kaitai Liang, and Chunhua Su, eds. Frontiers in Cyber Security. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-9739-8.
Full textAnbar, Mohammed, Nibras Abdullah, and Selvakumar Manickam, eds. Advances in Cyber Security. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-2693-0.
Full textLi, Fagen, Tsuyoshi Takagi, Chunxiang Xu, and Xiaosong Zhang, eds. Frontiers in Cyber Security. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-3095-7.
Full textAnbar, Mohammed, Nibras Abdullah, and Selvakumar Manickam, eds. Advances in Cyber Security. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6835-4.
Full textRass, Stefan, Stefan Schauer, Sandra König, and Quanyan Zhu. Cyber-Security in Critical Infrastructures. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-46908-5.
Full textProbst, Christian W., Jeffrey Hunker, Dieter Gollmann, and Matt Bishop, eds. Insider Threats in Cyber Security. Boston, MA: Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-7133-3.
Full textAwad, Ali Ismail, Steven Furnell, Marcin Paprzycki, and Sudhir Kumar Sharma, eds. Security in Cyber-Physical Systems. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-67361-1.
Full textBook chapters on the topic "Cyber(in-)security"
Austin, Greg. "Education in Cyber Security." In Cybersecurity in China, 21–40. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-68436-9_2.
Full textFielder, James D. "Cyber security in Kenya." In Routledge Companion to Global Cyber-Security Strategy, 543–52. New York : Routledge, 2020.: Routledge, 2020. http://dx.doi.org/10.4324/9780429399718-46.
Full textAhrend, Jan M., and Marina Jirotka. "Anticipation in Cyber-Security." In Handbook of Anticipation, 1–28. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-31737-3_26-1.
Full textAhrend, Jan M., and Marina Jirotka. "Anticipation in Cyber-security." In Handbook of Anticipation, 1559–85. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-91554-8_26.
Full textSingh, Madhusudan. "In-Vehicle Cyber Security." In Information Security of Intelligent Vehicles Communication, 117–24. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-2217-5_8.
Full textKim, Shiho, and Rakesh Shrestha. "In-Vehicle Communication and Cyber Security." In Automotive Cyber Security, 67–96. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-8053-6_4.
Full textMishra, Shiv Dutta, Bhupesh Kumar Dewangan, and Tanupriya Choudhury. "Cyber Security in Cloud Platforms." In Information Security and Optimization, 159–70. First edition. | Boca Raton : C&H\CRC Press, 2021.: Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781003045854-11.
Full textCassenti, Daniel N., Vladislav D. Veksler, and Blaine Hoffman. "Adaptive Automation in Cyber Security." In Advances in Intelligent Systems and Computing, 280–89. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-94223-0_27.
Full textHurel, Louise Marie, and Luisa Cruz Lobato. "Cyber security governance in Brazil." In Routledge Companion to Global Cyber-Security Strategy, 504–18. New York : Routledge, 2020.: Routledge, 2020. http://dx.doi.org/10.4324/9780429399718-43.
Full textRavidas, Dhrisya, Malcolm R. Pattinson, and Paula Oliver. "Cyber Security in Healthcare Organisations." In Human Aspects of Information Security and Assurance, 3–11. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81111-2_1.
Full textConference papers on the topic "Cyber(in-)security"
"Cyber Security Capacity Building: Cyber Security Education in Finnish Universities." In The 19th European Conference on Cyber Warfare. ACPI, 2020. http://dx.doi.org/10.34190/ews.20.112.
Full text"Cyber Security in HSI." In 2019 12th International Conference on Human System Interaction (HSI). IEEE, 2019. http://dx.doi.org/10.1109/hsi47298.2019.8942627.
Full textTioh, Jin-Ning, Mani Mina, and Douglas W. Jacobson. "Cyber security training a survey of serious games in cyber security." In 2017 IEEE Frontiers in Education Conference (FIE). IEEE, 2017. http://dx.doi.org/10.1109/fie.2017.8190712.
Full textAgbaje, Micheal, Oludele Awodele, and Chibueze Ogbonna. "Applications of Digital Watermarking to Cyber Security (Cyber Watermarking)." In InSITE 2015: Informing Science + IT Education Conferences: USA. Informing Science Institute, 2015. http://dx.doi.org/10.28945/2138.
Full textDogaru, Delia Ioana, and Ioan Dumitrache. "Cyber security in healthcare networks." In 2017 E-Health and Bioengineering Conference (EHB). IEEE, 2017. http://dx.doi.org/10.1109/ehb.2017.7995449.
Full textSafdar, Ghazanfar A., Tahera Kalsoom, and Naeem Ramzan. "Security Challenges in Cyber Systems." In 2020 International Conference on UK-China Emerging Technologies (UCET). IEEE, 2020. http://dx.doi.org/10.1109/ucet51115.2020.9205388.
Full textDsouza, Joanita, Laura Elezabeth, Ved Prakash Mishra, and Rachna Jain. "Security in Cyber-Physical Systems." In 2019 Amity International Conference on Artificial Intelligence (AICAI). IEEE, 2019. http://dx.doi.org/10.1109/aicai.2019.8701411.
Full textHoward, Newton, and Sergey Kanareykin. "Intention awareness in cyber security." In 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec). IEEE, 2012. http://dx.doi.org/10.1109/cybersec.2012.6246079.
Full textParmar, Manjula R., M. Uttara Kumari, and Ramesh S. N. "CYBER SECURITY IN VEHICLE COMMUNICATION." In 2020 IEEE International Conference for Innovation in Technology (INOCON). IEEE, 2020. http://dx.doi.org/10.1109/inocon50539.2020.9298286.
Full textDasgupta, Dipankar. "Computational Intelligence in Cyber Security." In 2006 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety. IEEE, 2006. http://dx.doi.org/10.1109/cihsps.2006.313289.
Full textReports on the topic "Cyber(in-)security"
Meza, Juan, Scott Campbell, and David Bailey. Mathematical and Statistical Opportunities in Cyber Security. Office of Scientific and Technical Information (OSTI), March 2009. http://dx.doi.org/10.2172/950976.
Full textASIAN TECHNOLOGY INFORMATION PROGRAM. ATIP Report: Cyber Security Research in China. Fort Belvoir, VA: Defense Technical Information Center, June 2015. http://dx.doi.org/10.21236/ada619229.
Full textHarris, Emilee. Success in Industrial Control System Cyber Security Training. Office of Scientific and Technical Information (OSTI), January 2016. http://dx.doi.org/10.2172/1483594.
Full textMeyers, C., S. Powers, and D. Faissol. Probabilistic Characterization of Adversary Behavior in Cyber Security. Office of Scientific and Technical Information (OSTI), October 2009. http://dx.doi.org/10.2172/967711.
Full textBichler, Stephen F. Mitigating Cyber Security Risk in Satellite Ground Systems. Fort Belvoir, VA: Defense Technical Information Center, April 2015. http://dx.doi.org/10.21236/ad1012754.
Full textDEFENSE SCIENCE BOARD WASHINGTON DC. Cyber Security and Reliability in a Digital Cloud. Fort Belvoir, VA: Defense Technical Information Center, January 2013. http://dx.doi.org/10.21236/ada581218.
Full textOlder, Susan. Advanced Course in Engineering (ACE) - Cyber Security Boot Camp. Fort Belvoir, VA: Defense Technical Information Center, April 2008. http://dx.doi.org/10.21236/ada481166.
Full textShalamanov, Velizar, and Irena Mladenova. UK-BG Partnership in Cyber Security for SME and Organizations. Procon, 2021. http://dx.doi.org/10.11610/cybsec04.
Full textAkyol, Bora A. Cyber Security Challenges in Using Cloud Computing in the Electric Utility Industry. Office of Scientific and Technical Information (OSTI), September 2012. http://dx.doi.org/10.2172/1052949.
Full textSmidts, Carol, Indrajit Ray, Quanyan Zhu, Timothy Mabry, and Timothy McJunkin. Support for Reactor Operators in Case of Cyber-Security Threats. Final Report. Office of Scientific and Technical Information (OSTI), December 2019. http://dx.doi.org/10.2172/1581617.
Full text