Academic literature on the topic 'Cyber Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cyber Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cyber Security"
G, Anusha. "Cyber Security." International Journal of Research Publication and Reviews 4, no. 4 (April 2023): 2585–87. http://dx.doi.org/10.55248/gengpi.4.423.36341.
Full textManoj Thakur Neha, Rajani. "Cyber Security." International Journal of Science and Research (IJSR) 13, no. 1 (January 5, 2024): 440–44. http://dx.doi.org/10.21275/mr231228122722.
Full textKalakuntla, Rohit, Anvesh Babu Vanamala, and Ranjith Reddy Kolipyaka. "Cyber Security." HOLISTICA – Journal of Business and Public Administration 10, no. 2 (August 1, 2019): 115–28. http://dx.doi.org/10.2478/hjbpa-2019-0020.
Full textKenzhebayeva, Z. E., G. Zh Isabayeva, and Zh K. Zhunusova. "CYBER SECURITY." REPORTS 6, no. 322 (December 15, 2018): 21–24. http://dx.doi.org/10.32014/2018.2518-1483.21.
Full textYue, On-Ching. "Cyber security." Technology in Society 25, no. 4 (November 2003): 565–69. http://dx.doi.org/10.1016/j.techsoc.2003.09.022.
Full textSubba, Dhirodatta. "Cyber Security." SALESIAN JOURNAL OF HUMANITIES & SOCIAL SCIENCES 4, no. 1 (May 1, 2013): 60–71. http://dx.doi.org/10.51818/sjhss.04.2013.60-71.
Full textMoses-Òkè, Roseline Obada. "Cyber Capacity without Cyber Security." Journal of Philosophy, Science & Law 12, no. 1 (2012): 1–14. http://dx.doi.org/10.5840/jpsl20121211.
Full textO'Connell, M. E. "Cyber Security without Cyber War." Journal of Conflict and Security Law 17, no. 2 (July 1, 2012): 187–209. http://dx.doi.org/10.1093/jcsl/krs017.
Full textBS, Guru Prasad, Dr Kiran GM, and Dr Dinesha HA. "AI-Driven cyber security: Security intelligence modelling." International Journal of Multidisciplinary Research and Growth Evaluation 4, no. 6 (2023): 961–65. http://dx.doi.org/10.54660/.ijmrge.2023.4.6.961-965.
Full textRademaker, Michel. "Assessing Cyber Security 2015." Information & Security: An International Journal 34 (2016): 93–104. http://dx.doi.org/10.11610/isij.3407.
Full textDissertations / Theses on the topic "Cyber Security"
Callegari, Giacomo <1995>. "Cyber Risk Analysis and Cyber Security." Master's Degree Thesis, Università Ca' Foscari Venezia, 2020. http://hdl.handle.net/10579/18083.
Full textLOBATO, LUÍSA CRUZ. "UNRAVELING THE CYBER SECURITY MARKET: THE STRUGGLES AMONG CYBER SECURITY COMPANIES AND THE PRODUCTION OF CYBER (IN)SECURITY." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2016. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=27784@1.
Full textCONSELHO NACIONAL DE DESENVOLVIMENTO CIENTÍFICO E TECNOLÓGICO
A presente dissertação investiga o papel das companhias de segurança cibernética na produção da segurança cibernética contemporânea. A crescente pressão para securitizar o ciberespaço contribuiu para o crescimento de um lucrativo mercado voltado para a provisão de produtos e serviços para clientes comerciais e governamentais. Utilizando uma perspectiva inspirada em Bourdieu, o trabalho: analisa as condições históricas nas quais as tecnologias da informação ganharam terreno no debate de segurança; identifica as posições e investiga as práticas das companhias de segurança cibernética no campo da segurança cibernética e analisa as disputas em andamento pela produção da segurança cibernética. Abordagens voltadas ao risco são pilares na concepção e comercialização de produtos e serviços anunciados pelas companhias. Neste sentido, argumenta-se que ambas as abordagens voltadas ao risco e as práticas comerciais das companhias de segurança cibernética produzem formas específicas de segurança. O trabalho identifica três distintas formas de segurança produzidas no campo: segurança defensiva, segurança ofensiva e defesa ativa. Analisa-se as implicações de cada forma para a segurança, de um modo geral, e argumenta-se que, enquanto grande parte das companhias adota uma estratégia de defesa ativa em seus produtos e serviços, algumas tem se orientado para a adoção de medidas mais ofensivas para lidar com os atuais riscos. A análise é concluída com algumas reflexões a respeito das implicações das atuais dinâmicas do mercado de segurança cibernética para a segurança e governança da Internet.
This dissertation examines the role of cyber security companies in the production of contemporary cyber security. The increasing pressures to securitize cyberspace have contributed to the growth of a lucrative market oriented at providing cyber security products and services to commercial and government customers. Using a Bourdieu-inspired framework, the work: analyzes the historical conditions under which information technologies gained ground within security debates; identifies the positions and investigates the practices of cyber security companies within the cyber security field and analyzes the ongoing struggles for the production of cyber security. Risk-based thinking is a cornerstone of the process of conceiving and commercializing products and services advertised by companies. In this sense, it is argued that both risk-based thinking and the commercial practices of cyber security companies produce specific forms of security. The work identifies three distinct forms of security produced within the field: defensive security, offensive security and active defense. It analyzes the implications of each form to the overall security of cyberspace and argues that whilst the majority of companies adopt an active defense approach in their products and services, some of them are leaning towards more offensive solutions to deal with current risks. It concludes the analysis with some thoughts on the implications of the current dynamics of the cyber security market for security and Internet governance.
Petrelli, Filippo <1991>. "La cyber insurance per gestire il cyber security risk." Master's Degree Thesis, Università Ca' Foscari Venezia, 2020. http://hdl.handle.net/10579/16913.
Full textSridharan, Venkatraman. "Cyber security in power systems." Thesis, Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/43692.
Full textAlmualla, Mohammed Humaid. "Collaborative cyber security situational awareness." Thesis, Brunel University, 2017. http://bura.brunel.ac.uk/handle/2438/16206.
Full textKonstantinos, Konstantinidis. "Automated cyber security compliance assessment." Thesis, KTH, Skolan för elektro- och systemteknik (EES), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-200950.
Full textFöretag och organisationer strävar efter att uppfylla olika cybersäkerhetsstandardermed mål att förbättra sina säkerhetsnivåer, attuppfylla kunders önskemål, eller då det krävs enligt lag.Efterlevnadsprocessen utförs av mänskliga bedömare och kangöras effektivare genom automatisering av en del underliggandeuppgifter som utgör den.Denna studie har som mål att skapa mjukvarurådgivare som bedömeren IT-arkitektur för efterlevnad av NERC-CIP-standard. För attuppnå detta följdes en tvåstegsprocess.Som första steg modellerades och mappades specifika NERCCIP-krav med hjälp av verktyget för modellering av cybersäkerhet,SecuriCAD. Sedan skapades en expertmjukvara med förmågan atttolka och jämföra SecuriCAD:s abstraktioner. Expertmjukvaran bedömersystemets efterlevnadsstatus via jämförelse av mappade regleroch den modellerade arkitekturens attributer. Som andra stegvaliderades programvaran och dess exakthet mättes. Detta uppnåddes via genomförande av Turingtest. Under testetjämfördes programvarans svar med svar från fem mänskliga områdesexperterpå cybersäkerhet i samma bedömningsuppgift. Jämförelsenöverläts till en annan områdesexpert som utvärderade svarenutan vetskap om deras ursprung. Svaren graderades och rangordnadesfrån bäst till sämst.Resultaten visar att expertprogrammet överträffade mänsklig expertisi given uppgift och tilldelades förstaplats tillsammans med enannan mänsklig expert.Studien innehåller också en sektion som beskriver metoden förextrahering av mätvärden som karaktäriserar NERC-CIP-standarden.Denna härrör från kombinationen av modellerade standardkrav ochverktyget SecuriCAD:s förmåga att simulera cyberattacker och produceraprobabilitiska säkerhetsmätvärden för en given arkitektur.Detta uppnåddes genom att skapa 50 slumpmässiga NERC-CIPefterlevandearkitekturer och extrahering av genomsnittlig tid en framgångsrikmotståndare behöver för att äventyra systemet.Resultaten visar att hälften av de lyckade attackerna mot vårtefterlevnadsexempel lyckades på 23,19 dagar i genomsnitt, och 5% av dem lyckades på 5,02 dagar i genomsnitt. Såsom indikeras av resultaten kan bedömningsmjukvaror ansesvara lika effektiva som mänskliga bedömare. De kan hjälpa en organisationatt förbereda för en planerad bedömning och hjälpa mänskligaefterlevnadsexperter med deras bedömningar. Slutligen kanden föreslagna metoden att extrahera säkerhetsmätvärden utgöraen grund för att förlängas till andra standarder och göra jämförelsermellan dessa. Detta vore en extra variabel under beslutsprocessenom vilken standardcertifikation för cybersäkerhet en organisationbör bedriva.
Bedhammar, Jennifer, and Oliver Johansson. "Visualization of cyber security attacks." Thesis, Linköpings universitet, Medie- och Informationsteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-167144.
Full textTar, Nicholas L. K. "When Cyber Systems Crash: Attitudes Towards Cyber Utilization And Security." NSUWorks, 2017. http://nsuworks.nova.edu/shss_dcar_etd/69.
Full textSmeets, Max. "Going cyber : the dynamics of cyber proliferation and international security." Thesis, University of Oxford, 2017. https://ora.ox.ac.uk/objects/uuid:ab28f9fc-dd21-4b34-809e-e0d100125e84.
Full textMiller, William B. "Classifying and Cataloging Cyber-Security Incidents Within Cyber-Physical Systems." BYU ScholarsArchive, 2014. https://scholarsarchive.byu.edu/etd/4345.
Full textBooks on the topic "Cyber Security"
Lu, Wei, Yuqing Zhang, Weiping Wen, Hanbing Yan, and Chao Li, eds. Cyber Security. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-9229-1.
Full textLehto, Martti, and Pekka Neittaanmäki, eds. Cyber Security. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-91293-2.
Full textHaltinner, Kristin, Dilshani Sarathchandra, Jim Alves-Foss, Kevin Chang, Daniel Conte de Leon, and Jia Song, eds. Cyber Security. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-28313-5.
Full textKlipper, Sebastian. Cyber Security. Wiesbaden: Springer Fachmedien Wiesbaden, 2015. http://dx.doi.org/10.1007/978-3-658-11577-7.
Full textYun, Xiaochun, Weiping Wen, Bo Lang, Hanbing Yan, Li Ding, Jia Li, and Yu Zhou, eds. Cyber Security. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-6621-5.
Full textBokhari, M. U., Namrata Agrawal, and Dharmendra Saini, eds. Cyber Security. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8536-9.
Full textMartellini, Maurizio, ed. Cyber Security. Cham: Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-319-02279-6.
Full textLu, Wei, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, and Yu Zhou, eds. Cyber Security. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-4922-3.
Full textLu, Wei, Yuqing Zhang, Weiping Wen, Hanbing Yan, and Chao Li, eds. Cyber Security. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-8285-9.
Full textMitra, Ananda. Digital security: Cyber terror and cyber security. New York: Chelsea House, 2010.
Find full textBook chapters on the topic "Cyber Security"
Race, Steve. "Cyber Security." In Construction Manager's BIM Handbook, 107–12. Chichester, UK: John Wiley & Sons, Ltd, 2016. http://dx.doi.org/10.1002/9781119163404.ch15.
Full textNejad, Bobby. "Cyber Security." In Introduction to Satellite Ground Segment Systems Engineering, 223–44. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-15900-8_16.
Full textCarr, Madeline. "Cyber Security." In US Power and the Internet in International Relations, 77–116. London: Palgrave Macmillan UK, 2016. http://dx.doi.org/10.1057/9781137550248_4.
Full textJasper, Scott, and James Wirtz. "Cyber Security." In The Palgrave Handbook of Security, Risk and Intelligence, 157–76. London: Palgrave Macmillan UK, 2017. http://dx.doi.org/10.1057/978-1-137-53675-4_9.
Full textDeFranco, Joanna F., and Bob Maley. "Cyber Security." In What Every Engineer Should Know About Cyber Security and Digital Forensics, 15–38. 2nd ed. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003245223-2.
Full textYang, Shichun, Xinhua Liu, Shen Li, and Cheng Zhang. "Cyber Security." In Advanced Battery Management System for Electric Vehicles, 237–68. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-3490-2_13.
Full textDillon, Roberto, Paul Lothian, Simran Grewal, and Daryl Pereira. "Cyber Security." In Digital Transformation in a Post-COVID World, 129–54. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003148715-7.
Full textWalters, Robert, and Marko Novak. "Cyber Security." In Cyber Security, Artificial Intelligence, Data Protection & the Law, 21–37. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1665-5_2.
Full textLexa, Carsten. "Cyber Security." In Fit für die digitale Zukunft, 55–61. Wiesbaden: Springer Fachmedien Wiesbaden, 2021. http://dx.doi.org/10.1007/978-3-658-33073-6_14.
Full textJuneja, Sapna, Abhinav Juneja, Vikram Bali, and Hemant Upadhyay. "Cyber Security." In Industry 4.0, AI, and Data Science, 135–46. New York: CRC Press, 2021. http://dx.doi.org/10.1201/9781003097181-9.
Full textConference papers on the topic "Cyber Security"
"Cyber security." In 2013 5th Conference on Information and Knowledge Technology (IKT). IEEE, 2013. http://dx.doi.org/10.1109/ikt.2013.6620126.
Full textMalgeri, John. "Cyber security." In 2009 Information Security Curriculum Development Conference. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1940976.1940998.
Full textMarty, Raffael. "Cyber security." In KDD' 13: The 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York, NY, USA: ACM, 2013. http://dx.doi.org/10.1145/2487575.2491132.
Full textStanković, Nebojša, and Vesna Ružičić. "Cyber Security in Education." In 9th International Scientific Conference Technics and Informatics in Education. University of Kragujevac, Faculty of Technical Sciences Čačak, 2022. http://dx.doi.org/10.46793/tie22.297s.
Full textLuknar, Ivana. "CYBER TERRORISM THREAT AND THE PANDEMIC." In SECURITY HORIZONS. Faculty of Security- Skopje, 2020. http://dx.doi.org/10.20544/icp.11.01.20.p29.
Full textHauser, Carl. "Minitrack: Cyber Security." In 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07). IEEE, 2007. http://dx.doi.org/10.1109/hicss.2007.359.
Full textVaradharajan, Vijay. "Rethinking cyber security." In the 4th international conference. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2070425.2070428.
Full textGarcia, Flavio. "Automotive Cyber Security." In CS2 '18: Fifth Workshop on Cryptography and Security in Computing Systems. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3178291.3178295.
Full textToh, Jinghui, Muhammad Hatib, Omer Porzecanski, and Yuval Elovici. "Cyber security patrol." In SAC 2017: Symposium on Applied Computing. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3019612.3019722.
Full textKesswani, Nishtha, and Sanjay Kumar. "Maintaining Cyber Security." In SIGMIS-CPR '15: 2015 Computers and People Research Conference. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2751957.2751976.
Full textReports on the topic "Cyber Security"
Prasad, Dr Anand R. Cyber Security. Denmark: River Publishers, June 2016. http://dx.doi.org/10.13052/popcas005.
Full textAuthor, Not Given. Laboratory Cyber Security Assessment. Office of Scientific and Technical Information (OSTI), February 2011. http://dx.doi.org/10.2172/1007330.
Full textMcMorrow, D. Science of Cyber-Security. Fort Belvoir, VA: Defense Technical Information Center, November 2010. http://dx.doi.org/10.21236/ada534220.
Full textAuthor, Not Given. IPCo Cyber Security Assessment. Office of Scientific and Technical Information (OSTI), September 2009. http://dx.doi.org/10.2172/965344.
Full textAuthor, Not Given. PacifiCorp Cyber Security Assessment. Office of Scientific and Technical Information (OSTI), October 2009. http://dx.doi.org/10.2172/968014.
Full textAuthor, Not Given. SISCO Cyber Security Assessments. Office of Scientific and Technical Information (OSTI), November 2009. http://dx.doi.org/10.2172/968015.
Full textMoore, Judy Hennessey, Lori K. Parrott, and Thomas H. Karas. Metaphors for cyber security. Office of Scientific and Technical Information (OSTI), August 2008. http://dx.doi.org/10.2172/947345.
Full textDavidson, J. R. ConsoleWorks Cyber Security Assessment. Office of Scientific and Technical Information (OSTI), July 2009. http://dx.doi.org/10.2172/959389.
Full textHsieh Ratliff, Gillian. Cyber Security Summer School. Office of Scientific and Technical Information (OSTI), November 2023. http://dx.doi.org/10.2172/2208757.
Full textLange, Nico, and Ulrike Strauss. MSB Cyber Security Roundtable. Munich Security Conference, September 2023. http://dx.doi.org/10.47342/ysbo6544.
Full text