Journal articles on the topic 'Cyber(in-)security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cyber(in-)security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
NASTASIU, Cătălin-Ionuț. "CYBER SECURITY STRATEGIES IN THE INTERNET ERA." SCIENTIFIC RESEARCH AND EDUCATION IN THE AIR FORCE 18, no. 2 (June 24, 2016): 619–24. http://dx.doi.org/10.19062/2247-3173.2016.18.2.19.
Full textKothiyal, Sonakshi. "Automation in Cyber-Security." International Journal for Research in Applied Science and Engineering Technology 7, no. 5 (May 31, 2019): 581–84. http://dx.doi.org/10.22214/ijraset.2019.5098.
Full textKour, Jaspreet, M. Hanmandlu, and A. Q. Ansari. "Biometrics in Cyber Security." Defence Science Journal 66, no. 6 (October 31, 2016): 600. http://dx.doi.org/10.14429/dsj.66.10800.
Full textKondewar, Shweta Vivekananda. "Cyber Security in Healthcare." International Journal for Research in Applied Science and Engineering Technology 9, no. 3 (March 31, 2021): 145–48. http://dx.doi.org/10.22214/ijraset.2021.33159.
Full textKaur, Prof Simranpreet. "Security in Cyber Crime." International Journal for Research in Applied Science and Engineering Technology 9, no. 9 (September 30, 2021): 694–98. http://dx.doi.org/10.22214/ijraset.2021.38023.
Full textCIOACĂ, Cătălin, Alexandru BRATU, and Daniel ȘTEFĂNESCU. "THE ANALYSIS OF BENCHMARKING APPLICATION IN CYBER SECURITY." SCIENTIFIC RESEARCH AND EDUCATION IN THE AIR FORCE 19, no. 2 (July 31, 2017): 57–62. http://dx.doi.org/10.19062/2247-3173.2017.19.2.8.
Full textMaqsood, Ayesha, and Muhammad Rizwan. "Security, Trust and Privacy In Cyber (Stpc Cyber)." International Journal of Scientific and Research Publications (IJSRP) 9, no. 2 (February 18, 2019): p8682. http://dx.doi.org/10.29322/ijsrp.9.02.2019.p8682.
Full textBhargava, Rishi. "Cyber Crime And Cyber Security In Madhya Pradesh." National Journal of Environment and Scientific Research 2, no. 8 (August 22, 2021): 53. http://dx.doi.org/10.53571/njesr.2021.2.8.53-61.
Full textLehto, Martti. "The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies." International Journal of Cyber Warfare and Terrorism 3, no. 3 (July 2013): 1–18. http://dx.doi.org/10.4018/ijcwt.2013070101.
Full textPriya, Mrs A. Lakshmi, and S. Letitia. "Dual Watermarking in Cyber Security." JOURNAL OF ADVANCES IN CHEMISTRY 13, no. 10 (March 4, 2017): 5923–26. http://dx.doi.org/10.24297/jac.v13i10.5834.
Full textKalakuntla, Rohit, Anvesh Babu Vanamala, and Ranjith Reddy Kolipyaka. "Cyber Security." HOLISTICA – Journal of Business and Public Administration 10, no. 2 (August 1, 2019): 115–28. http://dx.doi.org/10.2478/hjbpa-2019-0020.
Full textRICCI, Sara, Jan HAJNY, Edmundas PIESARSKAS, Simon PARKER, and Vladimir JANOUT. "Challenges in Cyber Security Education." International Journal of Information Security and Cybercrime 9, no. 2 (December 30, 2020): 7–11. http://dx.doi.org/10.19107/ijisc.2020.02.01.
Full textLiaropoulos, Andrew N. "Reconceptualising Cyber Security." International Journal of Cyber Warfare and Terrorism 6, no. 2 (April 2016): 32–40. http://dx.doi.org/10.4018/ijcwt.2016040103.
Full textPenchev, Georgi. "Planning and Implementing Change in Cyber Security Network Organisations." Information & Security: An International Journal 50 (2021): 89–101. http://dx.doi.org/10.11610/isij.5008.
Full textDol, Ganraj Rajendra. "A Research on Cyber Security And Cyber Coercion." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 20, 2021): 2110–12. http://dx.doi.org/10.22214/ijraset.2021.35455.
Full textSharma, Rajasekhar. "Artificial Intelligence in Cyber Security." International Journal for Research in Applied Science and Engineering Technology 8, no. 8 (August 31, 2020): 1121–23. http://dx.doi.org/10.22214/ijraset.2020.31123.
Full textMishra, Praveen Kumar, and Prabhakar Tiwari. "Cyber Security in Smart Grid." International Research Journal on Advanced Science Hub 2, no. 6 (September 19, 2020): 26–30. http://dx.doi.org/10.47392/irjash.2020.33.
Full textStrand, Chris. "Challenging confidence in cyber-security." Computer Fraud & Security 2014, no. 12 (December 2014): 12–15. http://dx.doi.org/10.1016/s1361-3723(14)70556-1.
Full textHarašta, Jakub. "Cyber Security in Young Democracies." Jurisprudence 20, no. 4 (2013): 1457–72. http://dx.doi.org/10.13165/jur-13-20-4-10.
Full textSadiku, Matthew N. O., Omobayode I. Fagbohungbe, and Sarhan M. Musa. "Artificial Intelligence in Cyber Security." International Journal of Engineering Research and Advanced Technology 06, no. 05 (2020): 01–07. http://dx.doi.org/10.31695/ijerat.2020.3612.
Full textBaldwin, Adrian, Iffat Gheyas, Christos Ioannidis, David Pym, and Julian Williams. "Contagion in cyber security attacks." Journal of the Operational Research Society 68, no. 7 (July 2017): 780–91. http://dx.doi.org/10.1057/jors.2016.37.
Full textKulshreshtha, Neelabh. "HCI: Use in Cyber Security." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (July 10, 2021): 109–13. http://dx.doi.org/10.22214/ijraset.2021.36246.
Full textBEST, Michael, Lachezar KRUMOV, and Ioan BACIVAROV. "Cyber Security in Banking Sector." International Journal of Information Security and Cybercrime 8, no. 2 (December 27, 2019): 39–52. http://dx.doi.org/10.19107/ijisc.2019.02.04.
Full textDas, Rammanohar, and Raghav Sandhane. "Artificial Intelligence in Cyber Security." Journal of Physics: Conference Series 1964, no. 4 (July 1, 2021): 042072. http://dx.doi.org/10.1088/1742-6596/1964/4/042072.
Full textShevchenko, Svitlana, Yulia Zhdanovа, Svitlana Spasiteleva, Olena Negodenko, Nataliia Mazur, and Kateryna Kravchuk. "MATHEMATICAL METHODS IN CYBER SECURITY: FRACTALS AND THEIR APPLICATIONS IN INFORMATION AND CYBER SECURITY." Cybersecurity: Education, Science, Technique, no. 5 (2019): 31–39. http://dx.doi.org/10.28925/2663-4023.2019.5.3139.
Full textCempaka Timur, Fauzia Gustarina. "The Rise of Cyber Diplomacy ASEAN’s Perspective in Cyber Security." KnE Social Sciences 2, no. 4 (June 13, 2017): 244. http://dx.doi.org/10.18502/kss.v2i4.893.
Full textBakhanova, M., and L. Synyayeva. "CYBER SHIP AND CYBER SECURITY IN THE BANKING SPHERE." Scientific papers OF DMYTRO MOTORNYI TAVRIA STATE AGROTECHNOLOGICAL UNIVERSITY (ECONOMIC SCIENCES) 41 (2020): 5–12. http://dx.doi.org/10.31388/2519-884x-2020-41-5-12.
Full textKurebwa, Jeffrey. "Understanding Cyber Security." International Journal of Systems and Service-Oriented Engineering 11, no. 1 (January 2021): 43–55. http://dx.doi.org/10.4018/ijssoe.2021010104.
Full textSTEZHKO, S., and T. SHEVCHENKO. "Current US experience in cyber security." INFORMATION AND LAW, no. 2(37) (June 23, 2021): 139–44. http://dx.doi.org/10.37750/2616-6798.2021.2(37).238349.
Full textKovács, László. "National Cyber Security as the Cornerstone of National Security." Land Forces Academy Review 23, no. 2 (June 1, 2018): 113–20. http://dx.doi.org/10.2478/raft-2018-0013.
Full textRekha, Gillala, Shaveta Malik, Amit Kumar Tyagi, and Meghna Manoj Nair. "Intrusion Detection in Cyber Security: Role of Machine Learning and Data Mining in Cyber Security." Advances in Science, Technology and Engineering Systems Journal 5, no. 3 (2020): 72–81. http://dx.doi.org/10.25046/aj050310.
Full textMurugesan, M., P. Balamurugan, J. Santhosh, and G. Arulkumaran. "Threats and Emerging Developments in Cyber Security." Webology 17, no. 2 (December 21, 2020): 587–98. http://dx.doi.org/10.14704/web/v17i2/web17053.
Full textGoswami, Arvind. "Impact of Cyber Security in Different Application of E-Governance." Journal of Advances and Scholarly Researches in Allied Education 15, no. 4 (June 1, 2018): 65–70. http://dx.doi.org/10.29070/15/57309.
Full textKurebwa, Jeffrey, and Eunice Magumise. "The Effectiveness of Cyber Security Frameworks in Combating Terrorism in Zimbabwe." International Journal of Cyber Research and Education 2, no. 1 (January 2020): 1–16. http://dx.doi.org/10.4018/ijcre.2020010101.
Full textPandey, Shipra, Rajesh Kumar Singh, Angappa Gunasekaran, and Anjali Kaushik. "Cyber security risks in globalized supply chains: conceptual framework." Journal of Global Operations and Strategic Sourcing 13, no. 1 (January 13, 2020): 103–28. http://dx.doi.org/10.1108/jgoss-05-2019-0042.
Full textAggarwal, Palvi, Frederic Moisan, Cleotilde Gonzalez, and Varun Dutt. "Understanding Cyber Situational Awareness in a Cyber Security Game involving." International Journal on Cyber Situational Awareness 4, no. 1 (December 7, 2018): 11–38. http://dx.doi.org/10.22619/ijcsa.2018.100118.
Full textŠtitilis, Darius, Irmantas Rotomskis, Marius Laurinaitis, Sergiy Nadvynychnyy, and Nadiya Khorunzhak. "National cyber security strategies: management, unification and assessment." Independent Journal of Management & Production 11, no. 9 (November 1, 2020): 2341. http://dx.doi.org/10.14807/ijmp.v11i9.1431.
Full textTrim, Peter R. J., and Yang-Im Lee. "The Global Cyber Security Model: Counteracting Cyber Attacks through a Resilient Partnership Arrangement." Big Data and Cognitive Computing 5, no. 3 (July 13, 2021): 32. http://dx.doi.org/10.3390/bdcc5030032.
Full textPeev, Momtchil, and Fred Fung. "1.2 Cyber Security - Blogbeitrag: Security in the Quantum Age." Digitale Welt 5, no. 4 (September 20, 2021): 68–71. http://dx.doi.org/10.1007/s42354-021-0413-x.
Full textKaragozlu, Damla. "Determination of cyber security ensuring behaviours of pre-service teachers." Cypriot Journal of Educational Sciences 15, no. 6 (December 31, 2020): 1698–706. http://dx.doi.org/10.18844/cjes.v15i6.5327.
Full textIsmail, Asim, Muhammad Saad, and Robert Abbas. "Cyber security in internet of things." Review of Computer Engineering Studies 5, no. 1 (March 30, 2019): 17–22. http://dx.doi.org/10.18280/rces.050104.
Full textMarmita, Sharmaine. "Struggle of ASEAN in cyber security." Asia and Africa today, no. 8 (2020): 52. http://dx.doi.org/10.31857/s032150750010451-8.
Full textBajpai, Ashish, Dayanand ., and Arushi Arya. "Big Data Analytics in Cyber Security." International Journal of Computer Sciences and Engineering 6, no. 7 (July 31, 2018): 731–34. http://dx.doi.org/10.26438/ijcse/v6i7.731734.
Full textRoşu, Livia, and Georgiana Subaşu. "Digital Forensics in Cyber Security Exercises." Journal of Military Technology 1, no. 1 (June 18, 2018): 13–18. http://dx.doi.org/10.32754/jmt.2018.1.02.
Full textRenaud, Karen, and Verena Zimmermann. "How to nudge in cyber security." Network Security 2020, no. 11 (November 2020): 20. http://dx.doi.org/10.1016/s1353-4858(20)30132-x.
Full textMoreira, Naiara, Elías Molina, Jesús Lázaro, Eduardo Jacob, and Armando Astarloa. "Cyber-security in substation automation systems." Renewable and Sustainable Energy Reviews 54 (February 2016): 1552–62. http://dx.doi.org/10.1016/j.rser.2015.10.124.
Full textJaysawal, Anoop. "Cyber Security in Smart Grid System." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 8 (August 30, 2017): 341. http://dx.doi.org/10.23956/ijarcsse.v7i8.85.
Full textTarasuk, A. V. "CYBER SECURITY SYSTEM SUBJECTS IN UKRAINE." Scientific notes of Taurida National V.I. Vernadsky University. Series: Juridical Sciences 2, no. 2 (2020): 119–24. http://dx.doi.org/10.32838/2707-0581/2020.2-2/23.
Full textTekleselase Woldemichael, Hailye. "Emerging Cyber Security Threats in Organization." International Journal of Information and Communication Sciences 5, no. 2 (2020): 19. http://dx.doi.org/10.11648/j.ijics.20200502.12.
Full textWallden, Petros, and Elham Kashefi. "Cyber security in the quantum era." Communications of the ACM 62, no. 4 (March 20, 2019): 120. http://dx.doi.org/10.1145/3241037.
Full text