Academic literature on the topic 'Cyber Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cyber Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cyber Security"

1

G, Anusha. "Cyber Security." International Journal of Research Publication and Reviews 4, no. 4 (April 2023): 2585–87. http://dx.doi.org/10.55248/gengpi.4.423.36341.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Manoj Thakur Neha, Rajani. "Cyber Security." International Journal of Science and Research (IJSR) 13, no. 1 (January 5, 2024): 440–44. http://dx.doi.org/10.21275/mr231228122722.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kalakuntla, Rohit, Anvesh Babu Vanamala, and Ranjith Reddy Kolipyaka. "Cyber Security." HOLISTICA – Journal of Business and Public Administration 10, no. 2 (August 1, 2019): 115–28. http://dx.doi.org/10.2478/hjbpa-2019-0020.

Full text
Abstract:
Abstract Cyber Security accepts a vigorous role in the area of information technology. Safeguarding the information has become an enormous problem in the current day. The cybersecurity the main thing that originates in mind is ‘cyber crimes’ which are aggregate colossally daily. Different governments and organizations are taking numerous measures to keep these cyber wrongdoings. Other than different measures cybersecurity is as yet a significant worry to many. This paper mostly emphases on cyber security and cyber terrorism. The significant trends of cybersecurity and the consequence of cybersecurity discuss in it. The cyber-terrorism could make associations lose billions of dollars in the region of organizations. The paper also explains the components of cyber terrorism and motivation of it. Two case studies related to cybersecurity also provide in this paper. Some solution about cyber security and cyber terrorism also explain in it.
APA, Harvard, Vancouver, ISO, and other styles
4

Kenzhebayeva, Z. E., G. Zh Isabayeva, and Zh K. Zhunusova. "CYBER SECURITY." REPORTS 6, no. 322 (December 15, 2018): 21–24. http://dx.doi.org/10.32014/2018.2518-1483.21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Yue, On-Ching. "Cyber security." Technology in Society 25, no. 4 (November 2003): 565–69. http://dx.doi.org/10.1016/j.techsoc.2003.09.022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Subba, Dhirodatta. "Cyber Security." SALESIAN JOURNAL OF HUMANITIES & SOCIAL SCIENCES 4, no. 1 (May 1, 2013): 60–71. http://dx.doi.org/10.51818/sjhss.04.2013.60-71.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Moses-Òkè, Roseline Obada. "Cyber Capacity without Cyber Security." Journal of Philosophy, Science & Law 12, no. 1 (2012): 1–14. http://dx.doi.org/10.5840/jpsl20121211.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

O'Connell, M. E. "Cyber Security without Cyber War." Journal of Conflict and Security Law 17, no. 2 (July 1, 2012): 187–209. http://dx.doi.org/10.1093/jcsl/krs017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

BS, Guru Prasad, Dr Kiran GM, and Dr Dinesha HA. "AI-Driven cyber security: Security intelligence modelling." International Journal of Multidisciplinary Research and Growth Evaluation 4, no. 6 (2023): 961–65. http://dx.doi.org/10.54660/.ijmrge.2023.4.6.961-965.

Full text
Abstract:
The process of defending computer networks from cyber attacks or unintended, unauthorized access is known as cyber security. Organizations, businesses, and governments need cyber security solutions because cyber criminals pose a threat to everyone. Artificial intelligence promises to be a great solution for this. Security experts are better able to defend vulnerable networks and data from cyber attackers by combining the strengths of artificial intelligence and cyber security. This paper provides an introduction to the use of artificial intelligence in cyber security. AI-driven cyber security refers to the use of artificial intelligence and machine learning technologies to enhance the protection of computer systems and networks from cyber threats such as hacking, malware, phishing, and other forms of cyberattacks. AI-powered security solutions are designed to automate the process of detecting, analyzing, and responding to security incidents in real-time, thereby improving the efficiency and effectiveness of cyber defense. These solutions can analyze large amounts of data, identify patterns and anomalies, and make decisions faster and more accurately than humans alone, enabling organizations to stay ahead of evolving cyber threats.
APA, Harvard, Vancouver, ISO, and other styles
10

Rademaker, Michel. "Assessing Cyber Security 2015." Information & Security: An International Journal 34 (2016): 93–104. http://dx.doi.org/10.11610/isij.3407.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Cyber Security"

1

Callegari, Giacomo <1995&gt. "Cyber Risk Analysis and Cyber Security." Master's Degree Thesis, Università Ca' Foscari Venezia, 2020. http://hdl.handle.net/10579/18083.

Full text
Abstract:
The dissertation will at first analyze the major trends and technologies adopted in the business context nowadays, analysing the main advantages and disavantages with a focus on the cyber risks that emerge in adopting such technologies. In additon, will be discuss how these risks really impact a corporation, analyzing the main economìc consequences that cyber-attacks and data breaches have. Moreover, in the dissertation will be introduced some key controls to minimize the possibility of a data breach, also presenting the NIST Framework as tool to be adopted in order to increase the overall cybersecurity of an organization. To conclude, a litterature review on how the cyber risks can be evaluate in the business field will be presented, also analysing some issues that companies face in this evaluation.
APA, Harvard, Vancouver, ISO, and other styles
2

LOBATO, LUÍSA CRUZ. "UNRAVELING THE CYBER SECURITY MARKET: THE STRUGGLES AMONG CYBER SECURITY COMPANIES AND THE PRODUCTION OF CYBER (IN)SECURITY." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2016. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=27784@1.

Full text
Abstract:
PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO
CONSELHO NACIONAL DE DESENVOLVIMENTO CIENTÍFICO E TECNOLÓGICO
A presente dissertação investiga o papel das companhias de segurança cibernética na produção da segurança cibernética contemporânea. A crescente pressão para securitizar o ciberespaço contribuiu para o crescimento de um lucrativo mercado voltado para a provisão de produtos e serviços para clientes comerciais e governamentais. Utilizando uma perspectiva inspirada em Bourdieu, o trabalho: analisa as condições históricas nas quais as tecnologias da informação ganharam terreno no debate de segurança; identifica as posições e investiga as práticas das companhias de segurança cibernética no campo da segurança cibernética e analisa as disputas em andamento pela produção da segurança cibernética. Abordagens voltadas ao risco são pilares na concepção e comercialização de produtos e serviços anunciados pelas companhias. Neste sentido, argumenta-se que ambas as abordagens voltadas ao risco e as práticas comerciais das companhias de segurança cibernética produzem formas específicas de segurança. O trabalho identifica três distintas formas de segurança produzidas no campo: segurança defensiva, segurança ofensiva e defesa ativa. Analisa-se as implicações de cada forma para a segurança, de um modo geral, e argumenta-se que, enquanto grande parte das companhias adota uma estratégia de defesa ativa em seus produtos e serviços, algumas tem se orientado para a adoção de medidas mais ofensivas para lidar com os atuais riscos. A análise é concluída com algumas reflexões a respeito das implicações das atuais dinâmicas do mercado de segurança cibernética para a segurança e governança da Internet.
This dissertation examines the role of cyber security companies in the production of contemporary cyber security. The increasing pressures to securitize cyberspace have contributed to the growth of a lucrative market oriented at providing cyber security products and services to commercial and government customers. Using a Bourdieu-inspired framework, the work: analyzes the historical conditions under which information technologies gained ground within security debates; identifies the positions and investigates the practices of cyber security companies within the cyber security field and analyzes the ongoing struggles for the production of cyber security. Risk-based thinking is a cornerstone of the process of conceiving and commercializing products and services advertised by companies. In this sense, it is argued that both risk-based thinking and the commercial practices of cyber security companies produce specific forms of security. The work identifies three distinct forms of security produced within the field: defensive security, offensive security and active defense. It analyzes the implications of each form to the overall security of cyberspace and argues that whilst the majority of companies adopt an active defense approach in their products and services, some of them are leaning towards more offensive solutions to deal with current risks. It concludes the analysis with some thoughts on the implications of the current dynamics of the cyber security market for security and Internet governance.
APA, Harvard, Vancouver, ISO, and other styles
3

Petrelli, Filippo <1991&gt. "La cyber insurance per gestire il cyber security risk." Master's Degree Thesis, Università Ca' Foscari Venezia, 2020. http://hdl.handle.net/10579/16913.

Full text
Abstract:
Viviamo in un mondo digitalizzato dove l’innovazione tecnologica porta con sé non solo grandi opportunità, ma anche innumerevoli rischi. Nel corso degli ultimi anni infatti, il crimine informatico è aumentato notevolmente essendo una forma di reato facilmente attuabile, gratificante e con scarse probabilità di cattura. Tale facilità sussiste in relazione alle scarse misure di protezione adottate dalla maggior parte degli utenti, anche quelle più elementari, inoltre numerosi prodotti tecnologici non sono dotati di difese adeguate. Contrariamente gli hacker utilizzano una tecnologia avanzata finalizzata a identificare gli obiettivi, creano e consegnano automaticamente software e monetizzano ciò che è stato rubato. Essi ci hanno dimostrato che è possibile compromettere auto a guida autonoma, accedere a sistemi avionici durante il volo e che dispositivi come i microinfusori e pacemaker sono molto vulnerabili agli attacchi informatici. La cyber security e in particolare la cyber insurance (il cui pricing viene svolto attraverso vari metodi tra cui le copula function) sono due metodi di protezione efficaci per le imprese che voglio combattere questo tipo di crimine.
APA, Harvard, Vancouver, ISO, and other styles
4

Sridharan, Venkatraman. "Cyber security in power systems." Thesis, Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/43692.

Full text
Abstract:
Many automation and power control systems are integrated into the 'Smart Grid' concept for efficiently managing and delivering electric power. This integrated approach created several challenges that need to be taken into consideration such as cyber security issues, information sharing, and regulatory compliance. There are several issues that need to be addressed in the area of cyber security. Currently, there are no metrics for evaluating cyber security and methodologies to detect cyber attacks are in their infancy. There is a perceived lack of security built into the smart grid systems, but there is no mechanism for information sharing on cyber security incidents. In this thesis, we discuss the vulnerabilities in power system devices, and present ideas and a proposal towards multiple-threat system intrusion detection. We propose to test the multiple-threat methods for cyber security monitoring on a multi-laboratory test bed, and aid the development of a SCADA test bed, to be constructed on the Georgia Tech Campus.
APA, Harvard, Vancouver, ISO, and other styles
5

Almualla, Mohammed Humaid. "Collaborative cyber security situational awareness." Thesis, Brunel University, 2017. http://bura.brunel.ac.uk/handle/2438/16206.

Full text
Abstract:
Situational awareness is often understood as the perception of environmental elements and comprehension of their meaning, and the projection of future status. The advancements in cyberspace technology have fuelled new business and opportunities, but also brought an element of risk to valued assets. Today, the growing gap between different types of cyber-attacks threatens governments and organisations, from individuals to highly organized sponsored teams capable of breaching the most sophisticated systems and the inability to cope with these emerging threats. There is a strong case to be made for effective Collaborative Cyber-Security Situational Awareness (CCSA) that is designed to protect valuable assets, making them more resilient to cybersecurity threats. Cybersecurity experts today must rethink the nature of security, and shift from a conventional approach that stresses protecting vulnerable assets to a larger, more effective framework with the aim of strengthening cyber assets, making them more resilient and part of a cybersecurity process that delivers greater value against cyber threats. This study introduces a new approach to understanding situational awareness of information sharing and collaboration using knowledge from existing situational awareness models. However, current situational awareness models lack resilience in supporting information systems infrastructure, addressing various vulnerabilities, identifying high priority threats and selecting mitigation techniques for cyber threats. The use of exploratory and explanatory analysis techniques executed by Structure Equation Modelling (SEM) allowed the examination of CCSA, in this study. Data from 377 cyber security practitioners affiliated to cybersecurity expert groups including computer emergency response team (CERT) and computer security incident response team (CSIRT) was gathered in the form of an electronic survey and analysed to discover insights and understand the mental model of those cybersecurity experts. Also, a finding from the SEM was the CSSA model aligned perfectly with the second-order Cybernetics model to test the theory in practice, confirming the possibility of using the proposed model in a practical application for this research. Furthermore, the SEM informed the design of the CCSA Environment where an empirical study was employed to verify and validate the CCSA theory in practice. In addition, the SEM informed the design of a behavioural anchor rating scale to measure participant situational awareness performance. The experiment results proved that when using the CCSA model and replicating real-world cyber-attack scenarios that the outcome of situational awareness performance was 61% more than those who did not employ the use of the CCSA model and associated dashboard tool. Further, it was found that both timeliness and accuracy are important in influencing the outcome of information sharing and collaboration in enhancing cyber situational awareness and decision-making. This thesis for the first time presents a novel CCSA theory which has been confirmed in practice. Firstly, this research work improves the outcome of effectiveness in cyber SA by identifying important variables related with the CCSA model. Second, it provides a new technique to measure operators' cyber SA performance. Secondly, it provides the necessary steps to employ information sharing in order to improve cyber security incorporated in the CCSA model. Finally, cybersecurity experts should collaborate to identify and close the gap between cybersecurity threats and execution capacity. The novel CCSA model validated in this research can be considered an effective solution in fighting and preventing cyber-attacks. Attainment of cyber security is driven by how information is both secured and presented between members to encourage the use of information sharing and collaboration to resolve cyber security threats in a timely and accurate manner. This research helps researchers and practitioners alike gain an understanding of key aspects of information sharing and collaboration in CSSA which is informed by the CCSA theory and new capability that the implementation of this theory has shown to deliver in practice.
APA, Harvard, Vancouver, ISO, and other styles
6

Konstantinos, Konstantinidis. "Automated cyber security compliance assessment." Thesis, KTH, Skolan för elektro- och systemteknik (EES), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-200950.

Full text
Abstract:
Companies and organizations seek to comply to various cybersecurity standards in order to improve their security levels, to followthe requirements of their customers or sometimes obliged by regulatorylaws.The compliance process rely on human assessors and could becomemore effective by automating a subset of the underlying tasksthat constitute it.This study is aimed at creating a software advisor that assessesan IT architecture for compliance to the NERC-CIP standard. Toachieve this a two step process was followed.At the first step specific NERC-CIP requirements were modeledand mapped using the SecuriCAD cyber security modeling tool.Then a software expert able to interpret and compare the Securi-CAD’s abstractions was created. Comparing the mapped rules withthe attributes of a modeled architecture the expert passes judgmenton the compliance status of the system. The second stage validated the advisor and measured its accuracy.That was achieved by conducting a Turing test. During the testanswers produced by the software advisor were compared to thoseof five human domain experts within cyber security for the same assessmenttask. The comparison was assigned to another domainexpert who evaluated the responses without being aware of theirorigin. The responses were graded and ranked from best to worst.The results show that the software expert was able to surpasshuman expertise for the given task and was ranked first along withanother human expert.Also the study contains a section that describes a method of extractingmetrics characterizing the NERC-CIP standard. This derivesfrom the combination of the modeled standard requirementsand the ability of the SecuriCAD tool to simulate cyber attacks andproduce probabilistic security metrics for a given architecture. Thatwas achieved by creating 50 random NERC-CIP compliant architecturesand extracting the average time that a successful adversaryneeds to compromise the system. The results show that half of the the successful attacks againstour compliant sample succeed on 23.19 days on average, while a5% of them succeed in 5.02 days on average.As indicated by the results software assessors can be as mucheffective as human assessors. They can help an organization toprepare for a scheduled assessment and assist human complianceexperts with their judgments. Finally the suggested method of extractingsecurity metrics could be a base for extending to other standardsand making comparisons among them. This would be anadded variable during the process of selecting which cyber securitystandard certification an organization should pursue.
Företag och organisationer strävar efter att uppfylla olika cybersäkerhetsstandardermed mål att förbättra sina säkerhetsnivåer, attuppfylla kunders önskemål, eller då det krävs enligt lag.Efterlevnadsprocessen utförs av mänskliga bedömare och kangöras effektivare genom automatisering av en del underliggandeuppgifter som utgör den.Denna studie har som mål att skapa mjukvarurådgivare som bedömeren IT-arkitektur för efterlevnad av NERC-CIP-standard. För attuppnå detta följdes en tvåstegsprocess.Som första steg modellerades och mappades specifika NERCCIP-krav med hjälp av verktyget för modellering av cybersäkerhet,SecuriCAD. Sedan skapades en expertmjukvara med förmågan atttolka och jämföra SecuriCAD:s abstraktioner. Expertmjukvaran bedömersystemets efterlevnadsstatus via jämförelse av mappade regleroch den modellerade arkitekturens attributer. Som andra stegvaliderades programvaran och dess exakthet mättes. Detta uppnåddes via genomförande av Turingtest. Under testetjämfördes programvarans svar med svar från fem mänskliga områdesexperterpå cybersäkerhet i samma bedömningsuppgift. Jämförelsenöverläts till en annan områdesexpert som utvärderade svarenutan vetskap om deras ursprung. Svaren graderades och rangordnadesfrån bäst till sämst.Resultaten visar att expertprogrammet överträffade mänsklig expertisi given uppgift och tilldelades förstaplats tillsammans med enannan mänsklig expert.Studien innehåller också en sektion som beskriver metoden förextrahering av mätvärden som karaktäriserar NERC-CIP-standarden.Denna härrör från kombinationen av modellerade standardkrav ochverktyget SecuriCAD:s förmåga att simulera cyberattacker och produceraprobabilitiska säkerhetsmätvärden för en given arkitektur.Detta uppnåddes genom att skapa 50 slumpmässiga NERC-CIPefterlevandearkitekturer och extrahering av genomsnittlig tid en framgångsrikmotståndare behöver för att äventyra systemet.Resultaten visar att hälften av de lyckade attackerna mot vårtefterlevnadsexempel lyckades på 23,19 dagar i genomsnitt, och 5% av dem lyckades på 5,02 dagar i genomsnitt. Såsom indikeras av resultaten kan bedömningsmjukvaror ansesvara lika effektiva som mänskliga bedömare. De kan hjälpa en organisationatt förbereda för en planerad bedömning och hjälpa mänskligaefterlevnadsexperter med deras bedömningar. Slutligen kanden föreslagna metoden att extrahera säkerhetsmätvärden utgöraen grund för att förlängas till andra standarder och göra jämförelsermellan dessa. Detta vore en extra variabel under beslutsprocessenom vilken standardcertifikation för cybersäkerhet en organisationbör bedriva.
APA, Harvard, Vancouver, ISO, and other styles
7

Bedhammar, Jennifer, and Oliver Johansson. "Visualization of cyber security attacks." Thesis, Linköpings universitet, Medie- och Informationsteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-167144.

Full text
Abstract:
The Swedish Defence Research Agency (FOI) simulates cyber attacks for research and education purposes in their cyber range, CRATE, with a system called SVED. This thesis describes the process of creating a visualization of the log files produced by SVED, with the purpose of increasing the users’ comprehension of the log files and thereby increasing their knowledge of the simulated attacks. To create an effective visualization a user study was held to know the users’ needs, experiences and requirements. Several designs were created based on the results and one was selected and refined using feedback from workshops. A web-based implementation of the design was created using the D3.js library, which included a directed graph, icicle chart and network graph to visualize the data. Thereafter an evaluation was held to analyze if the implementation was more effective than the log files, by letting the participants solve tasks defined by the user study. The results from the evaluation indicates that the visualization has a higher success rate than the log files when solving the tasks. They also indicate that finding the solution requires less time with the visualization. However, since the evaluation tasks were based on the user study, the results only conclude that the visualization is more effective when solving similar tasks. For further development the visualization could be improved with features like real time rendering and linkage with FOI’s internal systems. Additionally, with more research and further testing, the visualization could be used as a tool for standardization of graphics in cyber space. In conclusion, a visualization of the log files has been implemented and according to the evaluation does the visualization increase the users’ comprehension of the data in SVED’s log files.
APA, Harvard, Vancouver, ISO, and other styles
8

Tar, Nicholas L. K. "When Cyber Systems Crash: Attitudes Towards Cyber Utilization And Security." NSUWorks, 2017. http://nsuworks.nova.edu/shss_dcar_etd/69.

Full text
Abstract:
This research focused on examining attitudinal differences of Internet utilization and security with the objective of understanding the relationships that cyber usability have with cybercrime and then determine best practices needed to promote the secure use of the Internet. The research was designed as a quantitative study that used judgment sampling to survey 433 cases to explain the relationship that exists between cyber utilization and security. To achieve this objective, research questions and hypothesis were designed to guide the analysis. Cross tabulation analysis was used to compare the dependent and independent variables while Chi-square, Lambda and Gamma statistical tests were used to verify the relationship and identify statistical significance of the relationship. The findings revealed that while variables like being IT savvy, amount of financial loss, education, age, gender and residence location did not have evidence of a relationship with security, research participants had concern for secure cyber use and thought that cybersecurity awareness training and type of transaction conducted on the Internet were associated to security even though the strength of each relationship was weak. The study highlighted the damaging effects of cybercrime and recommended that cyber users should embrace best practice principles as they browse the Internet and utilize cybersecurity awareness training as an important function of secure IT utilization.
APA, Harvard, Vancouver, ISO, and other styles
9

Smeets, Max. "Going cyber : the dynamics of cyber proliferation and international security." Thesis, University of Oxford, 2017. https://ora.ox.ac.uk/objects/uuid:ab28f9fc-dd21-4b34-809e-e0d100125e84.

Full text
Abstract:
For over a decade, we have heard alarming statements about the spread of cyber weapons from senior policymakers and experts. Yet, the dynamics of cyber proliferation are still under-studied and under-theorized. This study offers a theoretical and empirical account of what causes the spread and restraint of cyber weapons and argues that the world is not at the brink of mass cyber proliferation. Whilst almost forty states are exploring and pursuing the development of cyber weapons, I indicate that only few have so far acquired a meaningful capability. This is due both to supply and demand factors. On the supply-side, most states have a latent capacity to develop relatively simple offensive cyber capabilities, but are unable to develop sophisticated cyber weapons. Moreover, the incentives for knowledge transfer and thus exporting offensive cyber capabilities between states are weak. On the demand-side, I show that national security considerations do not provide the best explanation of variance. Instead, domestic politics and prestige considerations are paramount. Moreover, and unlike nuclear proliferation, I argue that it is not the possession of cyber weapons but the intention of possession signalled through visible initiatives which matters. Ultimately, I note that cyber weapons can have strategic value - but only under certain conditions.
APA, Harvard, Vancouver, ISO, and other styles
10

Miller, William B. "Classifying and Cataloging Cyber-Security Incidents Within Cyber-Physical Systems." BYU ScholarsArchive, 2014. https://scholarsarchive.byu.edu/etd/4345.

Full text
Abstract:
In the past, there were perceived delineations between the cyber world and the physical world. We are becoming increasingly aware of the overlap between these two worlds, and the overlap itself is increasing. The overlap between these two worlds is known as cyber-physical systems. There have been several incidents involving cyber-physical systems and the number of these incidents is increasing dramatically. In the past there has been no effort to identify methods for describing these incidents in the unique context of cyber-physical systems. This research provides a taxonomy for classifying these incidents that focuses on cross domain, impact oriented analysis. A repository for information about these incidents has also been created as part of this research.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Cyber Security"

1

Lu, Wei, Yuqing Zhang, Weiping Wen, Hanbing Yan, and Chao Li, eds. Cyber Security. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-9229-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lehto, Martti, and Pekka Neittaanmäki, eds. Cyber Security. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-91293-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Haltinner, Kristin, Dilshani Sarathchandra, Jim Alves-Foss, Kevin Chang, Daniel Conte de Leon, and Jia Song, eds. Cyber Security. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-28313-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Klipper, Sebastian. Cyber Security. Wiesbaden: Springer Fachmedien Wiesbaden, 2015. http://dx.doi.org/10.1007/978-3-658-11577-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Yun, Xiaochun, Weiping Wen, Bo Lang, Hanbing Yan, Li Ding, Jia Li, and Yu Zhou, eds. Cyber Security. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-6621-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bokhari, M. U., Namrata Agrawal, and Dharmendra Saini, eds. Cyber Security. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8536-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Martellini, Maurizio, ed. Cyber Security. Cham: Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-319-02279-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lu, Wei, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, and Yu Zhou, eds. Cyber Security. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-4922-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lu, Wei, Yuqing Zhang, Weiping Wen, Hanbing Yan, and Chao Li, eds. Cyber Security. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-8285-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mitra, Ananda. Digital security: Cyber terror and cyber security. New York: Chelsea House, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Cyber Security"

1

Race, Steve. "Cyber Security." In Construction Manager's BIM Handbook, 107–12. Chichester, UK: John Wiley & Sons, Ltd, 2016. http://dx.doi.org/10.1002/9781119163404.ch15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Nejad, Bobby. "Cyber Security." In Introduction to Satellite Ground Segment Systems Engineering, 223–44. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-15900-8_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Carr, Madeline. "Cyber Security." In US Power and the Internet in International Relations, 77–116. London: Palgrave Macmillan UK, 2016. http://dx.doi.org/10.1057/9781137550248_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jasper, Scott, and James Wirtz. "Cyber Security." In The Palgrave Handbook of Security, Risk and Intelligence, 157–76. London: Palgrave Macmillan UK, 2017. http://dx.doi.org/10.1057/978-1-137-53675-4_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

DeFranco, Joanna F., and Bob Maley. "Cyber Security." In What Every Engineer Should Know About Cyber Security and Digital Forensics, 15–38. 2nd ed. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003245223-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yang, Shichun, Xinhua Liu, Shen Li, and Cheng Zhang. "Cyber Security." In Advanced Battery Management System for Electric Vehicles, 237–68. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-3490-2_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dillon, Roberto, Paul Lothian, Simran Grewal, and Daryl Pereira. "Cyber Security." In Digital Transformation in a Post-COVID World, 129–54. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003148715-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Walters, Robert, and Marko Novak. "Cyber Security." In Cyber Security, Artificial Intelligence, Data Protection & the Law, 21–37. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1665-5_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lexa, Carsten. "Cyber Security." In Fit für die digitale Zukunft, 55–61. Wiesbaden: Springer Fachmedien Wiesbaden, 2021. http://dx.doi.org/10.1007/978-3-658-33073-6_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Juneja, Sapna, Abhinav Juneja, Vikram Bali, and Hemant Upadhyay. "Cyber Security." In Industry 4.0, AI, and Data Science, 135–46. New York: CRC Press, 2021. http://dx.doi.org/10.1201/9781003097181-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cyber Security"

1

"Cyber security." In 2013 5th Conference on Information and Knowledge Technology (IKT). IEEE, 2013. http://dx.doi.org/10.1109/ikt.2013.6620126.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Malgeri, John. "Cyber security." In 2009 Information Security Curriculum Development Conference. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1940976.1940998.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Marty, Raffael. "Cyber security." In KDD' 13: The 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York, NY, USA: ACM, 2013. http://dx.doi.org/10.1145/2487575.2491132.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Stanković, Nebojša, and Vesna Ružičić. "Cyber Security in Education." In 9th International Scientific Conference Technics and Informatics in Education. University of Kragujevac, Faculty of Technical Sciences Čačak, 2022. http://dx.doi.org/10.46793/tie22.297s.

Full text
Abstract:
This paper presents an analysis of basic knowledge about cyber security in the education of high school students (from the first to the fourth grade of high school) and undergraduate students. The focus of the research is determining knowledge about cyber security, as well as identifying the desire of respondents to learn more about cyber security. The respondents were students of the Gymnasium and Technical School in Čačak and undergraduate students of the Information Technologies study program at the Faculty of Technical Sciences in Čačak, University of Kragujevac. An analysis of the conducted research on cyber security in education was carried out. Based on the results of the research, a discussion was given and conclusions were drawn in order to improve knowledge about cyber security in education.
APA, Harvard, Vancouver, ISO, and other styles
5

Luknar, Ivana. "CYBER TERRORISM THREAT AND THE PANDEMIC." In SECURITY HORIZONS. Faculty of Security- Skopje, 2020. http://dx.doi.org/10.20544/icp.11.01.20.p29.

Full text
Abstract:
The contemporary pandemic caused by COVID-19 and its highest risk of spreading have changed the world in almost every sphere. In the rules of social distancing and self-isolation, digital technologies are basic form of communication and work. For the purpose of this paper using content analysis method will provide information about cyber security threats and how very quickly they are moving during the COVID-19 pandemic. How the COVID-19 pandemic makes cyber terrorism the most current threat? We should see this situation as an opportunity to improve existing and build more secure digital infrastructure. The purpose of the paper is to show that it is essential to have a good cyber security on the timing and stringency of responses across the world. Keywords: cyber terrorism, cyber security, cyber space, COVID-19
APA, Harvard, Vancouver, ISO, and other styles
6

Hauser, Carl. "Minitrack: Cyber Security." In 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07). IEEE, 2007. http://dx.doi.org/10.1109/hicss.2007.359.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Varadharajan, Vijay. "Rethinking cyber security." In the 4th international conference. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2070425.2070428.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Garcia, Flavio. "Automotive Cyber Security." In CS2 '18: Fifth Workshop on Cryptography and Security in Computing Systems. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3178291.3178295.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Toh, Jinghui, Muhammad Hatib, Omer Porzecanski, and Yuval Elovici. "Cyber security patrol." In SAC 2017: Symposium on Applied Computing. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3019612.3019722.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kesswani, Nishtha, and Sanjay Kumar. "Maintaining Cyber Security." In SIGMIS-CPR '15: 2015 Computers and People Research Conference. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2751957.2751976.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Cyber Security"

1

Prasad, Dr Anand R. Cyber Security. Denmark: River Publishers, June 2016. http://dx.doi.org/10.13052/popcas005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Author, Not Given. Laboratory Cyber Security Assessment. Office of Scientific and Technical Information (OSTI), February 2011. http://dx.doi.org/10.2172/1007330.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

McMorrow, D. Science of Cyber-Security. Fort Belvoir, VA: Defense Technical Information Center, November 2010. http://dx.doi.org/10.21236/ada534220.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Author, Not Given. IPCo Cyber Security Assessment. Office of Scientific and Technical Information (OSTI), September 2009. http://dx.doi.org/10.2172/965344.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Author, Not Given. PacifiCorp Cyber Security Assessment. Office of Scientific and Technical Information (OSTI), October 2009. http://dx.doi.org/10.2172/968014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Author, Not Given. SISCO Cyber Security Assessments. Office of Scientific and Technical Information (OSTI), November 2009. http://dx.doi.org/10.2172/968015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Moore, Judy Hennessey, Lori K. Parrott, and Thomas H. Karas. Metaphors for cyber security. Office of Scientific and Technical Information (OSTI), August 2008. http://dx.doi.org/10.2172/947345.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Davidson, J. R. ConsoleWorks Cyber Security Assessment. Office of Scientific and Technical Information (OSTI), July 2009. http://dx.doi.org/10.2172/959389.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hsieh Ratliff, Gillian. Cyber Security Summer School. Office of Scientific and Technical Information (OSTI), November 2023. http://dx.doi.org/10.2172/2208757.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lange, Nico, and Ulrike Strauss. MSB Cyber Security Roundtable. Munich Security Conference, September 2023. http://dx.doi.org/10.47342/ysbo6544.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography