Journal articles on the topic 'Cyber-infrastructure'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cyber-infrastructure.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
MANUILOV, Y. "Cyber security of critical infrastructure during cyber warfare." INFORMATION AND LAW, no. 1(44) (March 28, 2023): 154–67. http://dx.doi.org/10.37750/2616-6798.2023.1(44).287780.
Full textSatya Praveen Kumar, Naga. "Cybersecurity and Cyber Attacks in Cloud Infrastructure." International Journal of Science and Research (IJSR) 12, no. 4 (2023): 1915–20. https://doi.org/10.21275/sr24628043205.
Full textWhite, Garry L. "Infrastructure Cyber-Attack Awareness Training." International Journal of Information Security and Privacy 16, no. 1 (2022): 1–26. http://dx.doi.org/10.4018/ijisp.291702.
Full textBoughton, Nick. "Protecting infrastructure from cyber attack." Network Security 2019, no. 4 (2019): 18–19. http://dx.doi.org/10.1016/s1353-4858(19)30051-0.
Full textKelic, Andjelka. "Cyber Risk in Critical Infrastructure." ACM SIGMETRICS Performance Evaluation Review 46, no. 2 (2019): 72–75. http://dx.doi.org/10.1145/3305218.3305243.
Full textRamage, Xavier, Khutso Lebea, and Siphesihle Sithungu. "Cyber Warfare and Critical Infrastructure." European Conference on Cyber Warfare and Security 24, no. 1 (2025): 566–75. https://doi.org/10.34190/eccws.24.1.3526.
Full textRai, Roshan. "From Digital India to Digital Economy: Understanding India's Cyber Infrastructure and Cyber Security." International Journal of Science and Research (IJSR) 10, no. 10 (2021): 1421–26. https://doi.org/10.21275/mr211010171914.
Full textMaliarchuk, Tamara, Yuriy Danyk, and Chad Briggs. "Hybrid Warfare and Cyber Effects in Energy Infrastructure." Connections: The Quarterly Journal 18, no. 1-2 (2019): 93–110. http://dx.doi.org/10.11610/connections.18.1-2.06.
Full textCIAPA, S. "Legal and organizational provision of protection of the critical information infrastructure from cyberattacks." INFORMATION AND LAW, no. 4(39) (December 9, 2021): 121–28. http://dx.doi.org/10.37750/2616-6798.2021.4(39).248832.
Full textKhydyntsev, M. M., V. Yu Zubok, and I. L. Palazhchenko. "Approaches to the Analysis of Sets of Cyber Statistics Indicators." Èlektronnoe modelirovanie 46, no. 6 (2024): 72–96. https://doi.org/10.15407/emodel.46.06.072.
Full textMuhammad Jamshid Khan. "Securing network infrastructure with cyber security." World Journal of Advanced Research and Reviews 17, no. 2 (2023): 803–13. http://dx.doi.org/10.30574/wjarr.2023.17.2.0308.
Full textMuhammad, Jamshid Khan. "Securing network infrastructure with cyber security." World Journal of Advanced Research and Reviews 17, no. 2 (2023): 803–13. https://doi.org/10.5281/zenodo.8109753.
Full textChester, Mikhail V., and Braden R. Allenby. "Perspective: The Cyber Frontier and Infrastructure." IEEE Access 8 (2020): 28301–10. http://dx.doi.org/10.1109/access.2020.2971960.
Full textOnyeji, Ijeoma, Morgan Bazilian, and Chris Bronk. "Cyber Security and Critical Energy Infrastructure." Electricity Journal 27, no. 2 (2014): 52–60. http://dx.doi.org/10.1016/j.tej.2014.01.011.
Full textWinter, H. Henning, and Marian Mours. "The cyber infrastructure initiative for rheology." Rheologica Acta 45, no. 4 (2005): 331–38. http://dx.doi.org/10.1007/s00397-005-0041-7.
Full textKwon, Sungmoon, Seokcheol Lee, Jiwoong Jang, and Taeshik Shon. "Cyber Security Framework for Critical Infrastructure." Journal of the Korea Institute of Information Security and Cryptology 27, no. 2 (2017): 241–50. http://dx.doi.org/10.13089/jkiisc.2017.27.2.241.
Full textVesić, Slavimir, and Martin Bjelajac. "Cyber security of a critical infrastructure." Pravo - teorija i praksa 40, no. 2 (2023): 77–88. http://dx.doi.org/10.5937/ptp2302077v.
Full textGanapathy, Apoorva. "Cyber Security for the Cloud Infrastructure." Asian Journal of Applied Science and Engineering 8, no. 1 (2019): 15–24. http://dx.doi.org/10.18034/ajase.v8i1.8.
Full textKAMIŃSKI, Marcin. "CYBER SECURITY REQUIREMENTS FOR PORT INFRASTRUCTURE." Cybersecurity & Cybercrime 1, no. 1 (2021): 85–99. http://dx.doi.org/10.5604/01.3001.0053.8012.
Full textProgoulakis, Iosif, Nikitas Nikitakos, Dimitrios Dalaklis, and Razali Yaacob. "Cyber-physical security for ports infrastructure." International Maritime Transport and Logistic Journal 11 (August 30, 2022): 105. http://dx.doi.org/10.21622/marlog.2022.11.105.
Full textApoorva, .Ganapathy. "Cyber Security for the Cloud Infrastructure." Asian Journal of Applied Science and Engineering 8, no. 1 (2019): 15–24. https://doi.org/10.5281/zenodo.5522424.
Full textİmamoğlu, Mustafa Bilgehan. "CYBER INFRASTRUCTURE GUIDE: IT/OT INTEGRATION." Ömer Halisdemir Üniversitesi İktisadi ve İdari Bilimler Fakültesi Dergisi 18, no. 1 (2025): 378–91. https://doi.org/10.25287/ohuiibf.1558269.
Full textShkitov, A. "Features of creating a multi-level model of cyber security of critical infrastructure data: an interdisciplinary approach." COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION, no. 56 (September 27, 2024): 71–77. http://dx.doi.org/10.36910/6775-2524-0560-2024-56-08.
Full textMashtaliar, Yana, Valerii Kozachok, Zoreslava Brzhevska, and Oleksandr Bohdanov. "RESEARCH OF DEVELOPMENT AND INNOVATION OF CYBER PROTECTION AT CRITICAL INFRASTRUCTURE FACILITIES." Cybersecurity: Education, Science, Technique 2, no. 22 (2023): 156–67. http://dx.doi.org/10.28925/2663-4023.2023.22.156167.
Full textKhudyntsev, Mykola M., and Igor L. Palazhchenko. "Cybersecurity maturity models for cybersecurity assessment in critical infrastructure." Environmental safety and natural resources 52, no. 4 (2024): 122–34. https://doi.org/10.32347/2411-4049.2024.4.122-134.
Full textWright, Marc, Hassan Chizari, and Thiago Viana. "A Systematic Review of Smart City Infrastructure Threat Modelling Methodologies: A Bayesian Focused Review." Sustainability 14, no. 16 (2022): 10368. http://dx.doi.org/10.3390/su141610368.
Full textBielska, Tetiana. "MECHANISMS OF CRITICAL INFRASTRUCTURE CYBERSECURITY MANAGEMENT AT THE STATE LEVEL." Global Scientific Trends: Economics and Public Administration 1/2024 (February 15, 2024): 27–38. https://doi.org/10.5281/zenodo.10635274.
Full textOkori, Washington, and Sarah Buteraba. "Cyber Security Exploits and Management in Telecommunication Companies: The Case of Uganda." Journal of Computer Science and Technology Studies 6, no. 4 (2024): 67–76. http://dx.doi.org/10.32996/jcsts.2024.6.4.10.
Full textBerezdetskyi, Yurii, and Maksym Palchyk. "Some Aspects of Cybersecurity Protection Provided for Critical Infrastructure Objects: Experience that can be Implemented in Ukraine." Information Security of the Person, Society and State, no. 27 (2019): 49–56. http://dx.doi.org/10.51369/2707-7276-2019-3-5.
Full textRao, Nageswara, Chris Ma, Fei He, David Yau, and Jun Zhuang. "Cyber–Physical Correlation Effects in Defense Games for Large Discrete Infrastructures." Games 9, no. 3 (2018): 52. http://dx.doi.org/10.3390/g9030052.
Full textTkachov, Andrii, Roman Korolov, Irada Rahimova, Iryna Aksonova, and Yelyzaveta Sevriukova. "CYBERSECURITY CHALLENGES AND SOLUTIONS FOR CRITICAL INFRASTRUCTURE PROTECTION." Ukrainian Scientific Journal of Information Security 30, no. 1 (2024): 58–66. http://dx.doi.org/10.18372/2225-5036.30.18604.
Full textIbanga, Isaac John, Karnilius Gideon Fwah, and Adebayo John Idowu. "Assessing the Vulnerabilities: Cybersecurity Challenges in Power System Infrastructure in Nigeria." June-July 2024, no. 44 (June 17, 2024): 22–35. http://dx.doi.org/10.55529/ijitc.44.22.35.
Full textYoun, Jaepil, Kookjin Kim, Daeyoung Kang, Jaeil Lee, Moosung Park, and Dongkyoo Shin. "Research on Cyber ISR Visualization Method Based on BGP Archive Data through Hacking Case Analysis of North Korean Cyber-Attack Groups." Electronics 11, no. 24 (2022): 4142. http://dx.doi.org/10.3390/electronics11244142.
Full textBakalynskyi, O., and D. Pakholchenko. "Analysis of Cybersecurity Requirements of Automated Process Control Systems As Critical Information Infrastructure." Èlektronnoe modelirovanie 43, no. 4 (2021): 103–12. http://dx.doi.org/10.15407/emodel.43.04.103.
Full textProgoulakis, Iosif, Paul Rohmeyer, and Nikitas Nikitakos. "Cyber Physical Systems Security for Maritime Assets." Journal of Marine Science and Engineering 9, no. 12 (2021): 1384. http://dx.doi.org/10.3390/jmse9121384.
Full textSaxena, Ritesh. "Securing IT Infrastructure – A Complete Solution." Global Journal of Enterprise Information System 8, no. 1 (2016): 59. http://dx.doi.org/10.18311/gjeis/2016/7292.
Full textLimba, Tadas, Tomas Plėta, Konstantin Agafonov, and Martynas Damkus. "Cyber security management model for critical infrastructure." Entrepreneurship and Sustainability Issues 4, no. 4 (2017): 559–73. http://dx.doi.org/10.9770/jesi.2017.4.4(12).
Full textHarris, A. "The Invisible [cyber attacks on critical infrastructure]." Engineering & Technology 8, no. 10 (2013): 40–42. http://dx.doi.org/10.1049/et.2013.1003.
Full textTonn, Gina, Jay P. Kesan, Linfeng Zhang, and Jeffrey Czajkowski. "Cyber risk and insurance for transportation infrastructure." Transport Policy 79 (July 2019): 103–14. http://dx.doi.org/10.1016/j.tranpol.2019.04.019.
Full textKomissarova, Natalia, and Pavlo Krutikov. "CYBER PROTECTION SYSTEM FOR CRITICAL INFRASTRUCTURE FACILITIES IN WARFARE CONDITIONS." Науковий вісник Київського інституту Національної гвардії України, no. 2 (December 31, 2024): 43–48. https://doi.org/10.59226/2786-6920.2.2024.43-48.
Full textXia, Yingjie, Jia Hu, and Michael D. Fontaine. "A Cyber-ITS Framework for Massive Traffic Data Analysis Using Cyber Infrastructure." Scientific World Journal 2013 (2013): 1–9. http://dx.doi.org/10.1155/2013/462846.
Full textChinthamu, Narender, Shobana Jayakumar, Manasa K, Revathi M P, Syed Zahidur Rashid, and Jansirani D. "Cyber-Physical Systems Security Protecting Critical Infrastructure from Cyber Threats and Attacks." ITM Web of Conferences 76 (2025): 03005. https://doi.org/10.1051/itmconf/20257603005.
Full textKilani, Yanal. "Cyber-security effect on organizational internal process: mediating role of technological infrastructure." Problems and Perspectives in Management 18, no. 1 (2020): 449–60. http://dx.doi.org/10.21511/ppm.18(1).2020.39.
Full textMaltseva, Irina, Yuliya Chernysh, and Viacheslav Ovsiannikov. "ANALYSIS OF CYBER RESISTANCE ASSESSMENT METHODS OF CRITICAL INFRASTRUCTURE." Cybersecurity: Education, Science, Technique 12, no. 4 (2021): 29–35. http://dx.doi.org/10.28925/2663-4023.2021.12.2935.
Full textRudy, Agus Gemilang Gultom, and Farid Wajdi Ahmad. "Development of Six Ware Cyber Defense Framework (SWCDF) Design as a Standardization of Computer Network Protection State Defense Information System." International Journal of Arts and Social Science 5, no. 3 (2023): 293–310. https://doi.org/10.5281/zenodo.7751136.
Full textALEKSEIEVA, O. "Legal support of cyber security of critical infrastructure objects." INFORMATION AND LAW, no. 4(47) (November 29, 2023): 168–76. http://dx.doi.org/10.37750/2616-6798.2023.4(47).291633.
Full textBoard, Editorial. "Well-known Personality in a Technical World and Information System." Global Journal of Enterprise Information System 8, no. 1 (2016): 62. http://dx.doi.org/10.18311/gjeis/2016/7294.
Full textIlyenko, Anna, Valentyna Teliushchenko, and Olena Dubchak. "MODERN CYBER THREATS TO CRITICAL INFRASTRUCTURE IN UKRAINE AND THE WORLD." Cybersecurity: Education, Science, Technique 3, no. 27 (2025): 150–64. https://doi.org/10.28925/2663-4023.2023.27.719.
Full textAchar, Sandesh, Nuruzzaman Faruqui, Md Whaiduzzaman, Albara Awajan, and Moutaz Alazab. "Cyber-Physical System Security Based on Human Activity Recognition through IoT Cloud Computing." Electronics 12, no. 8 (2023): 1892. http://dx.doi.org/10.3390/electronics12081892.
Full textAbu Al-Jibeen, Dr Mohamed. "Integration of Management Information Systems (Cyber Infrastructure) and Operations Research." Indian Journal of Applied Research 4, no. 6 (2011): 316–20. http://dx.doi.org/10.15373/2249555x/june2014/97.
Full text