Journal articles on the topic 'Cyber Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cyber Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
G, Anusha. "Cyber Security." International Journal of Research Publication and Reviews 4, no. 4 (April 2023): 2585–87. http://dx.doi.org/10.55248/gengpi.4.423.36341.
Full textManoj Thakur Neha, Rajani. "Cyber Security." International Journal of Science and Research (IJSR) 13, no. 1 (January 5, 2024): 440–44. http://dx.doi.org/10.21275/mr231228122722.
Full textKalakuntla, Rohit, Anvesh Babu Vanamala, and Ranjith Reddy Kolipyaka. "Cyber Security." HOLISTICA – Journal of Business and Public Administration 10, no. 2 (August 1, 2019): 115–28. http://dx.doi.org/10.2478/hjbpa-2019-0020.
Full textKenzhebayeva, Z. E., G. Zh Isabayeva, and Zh K. Zhunusova. "CYBER SECURITY." REPORTS 6, no. 322 (December 15, 2018): 21–24. http://dx.doi.org/10.32014/2018.2518-1483.21.
Full textYue, On-Ching. "Cyber security." Technology in Society 25, no. 4 (November 2003): 565–69. http://dx.doi.org/10.1016/j.techsoc.2003.09.022.
Full textSubba, Dhirodatta. "Cyber Security." SALESIAN JOURNAL OF HUMANITIES & SOCIAL SCIENCES 4, no. 1 (May 1, 2013): 60–71. http://dx.doi.org/10.51818/sjhss.04.2013.60-71.
Full textMoses-Òkè, Roseline Obada. "Cyber Capacity without Cyber Security." Journal of Philosophy, Science & Law 12, no. 1 (2012): 1–14. http://dx.doi.org/10.5840/jpsl20121211.
Full textO'Connell, M. E. "Cyber Security without Cyber War." Journal of Conflict and Security Law 17, no. 2 (July 1, 2012): 187–209. http://dx.doi.org/10.1093/jcsl/krs017.
Full textBS, Guru Prasad, Dr Kiran GM, and Dr Dinesha HA. "AI-Driven cyber security: Security intelligence modelling." International Journal of Multidisciplinary Research and Growth Evaluation 4, no. 6 (2023): 961–65. http://dx.doi.org/10.54660/.ijmrge.2023.4.6.961-965.
Full textRademaker, Michel. "Assessing Cyber Security 2015." Information & Security: An International Journal 34 (2016): 93–104. http://dx.doi.org/10.11610/isij.3407.
Full textBhatia, Deepshikha. "A Comprehensive Review on the Cyber Security Methods in Indian Organisation." International Journal of Advances in Soft Computing and its Applications 14, no. 1 (March 28, 2022): 103–24. http://dx.doi.org/10.15849/ijasca.220328.08.
Full textShukla, Mayur. "A Study on the Parameters that Affect Cyber Security." International Journal of Research in Engineering, Science and Management 3, no. 9 (September 13, 2020): 15–16. http://dx.doi.org/10.47607/ijresm.2020.276.
Full textBora, Rajani. "Challenges and Emerging Trends in Cyber Security." Shodh Sari-An International Multidisciplinary Journal 02, no. 03 (July 1, 2023): 26–41. http://dx.doi.org/10.59231/sari7590.
Full textMuhammad Jamshid Khan. "Securing network infrastructure with cyber security." World Journal of Advanced Research and Reviews 17, no. 2 (February 28, 2023): 803–13. http://dx.doi.org/10.30574/wjarr.2023.17.2.0308.
Full textSharma, Suman, Yogesh Verma, and Amit Nadda. "Information Security Cyber Security Challenges." International Journal of Scientific Research in Computer Science and Engineering 7, no. 1 (February 28, 2019): 10–15. http://dx.doi.org/10.26438/ijsrcse/v7i1.1015.
Full textKanu, Ved Prakash Sah, Yusuf Ai Naiem, and Sudha Shanker Prasad. "A Research of Cybersecurity and Threats in Emerging Technologies." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (April 30, 2022): 2935–38. http://dx.doi.org/10.22214/ijraset.2022.41858.
Full textMackay, Matthew. "Cyber Mission Assurance for Cyber Security." ITNOW 62, no. 1 (February 17, 2020): 32–33. http://dx.doi.org/10.1093/itnow/bwaa014.
Full textSHARMA, Rishabh. "Cyber Security to Safeguard Cyber Attacks." International Journal of Information Security and Cybercrime 11, no. 2 (December 29, 2022): 50–63. http://dx.doi.org/10.19107/ijisc.2022.02.05.
Full textSingh, Ujjwal, and Pawan Singh. "Managing Cyber Security." Journal of Management and Service Science (JMSS) 2, no. 1 (February 25, 2022): 1–10. http://dx.doi.org/10.54060/jmss/002.01.002.
Full textLiaropoulos, Andrew N. "Reconceptualising Cyber Security." International Journal of Cyber Warfare and Terrorism 6, no. 2 (April 2016): 32–40. http://dx.doi.org/10.4018/ijcwt.2016040103.
Full textKurebwa, Jeffrey. "Understanding Cyber Security." International Journal of Systems and Service-Oriented Engineering 11, no. 1 (January 2021): 43–55. http://dx.doi.org/10.4018/ijssoe.2021010104.
Full textSingh, Arunabh. "Cyber Security Frameworks." International Journal for Research in Applied Science and Engineering Technology 10, no. 1 (January 31, 2022): 590–99. http://dx.doi.org/10.22214/ijraset.2022.39843.
Full textSaha, Goutam Kumar. "Cyber Security Issues." International Journal of Applied Research on Information Technology and Computing 11, no. 3 (2020): 115–19. http://dx.doi.org/10.5958/0975-8089.2020.00012.3.
Full textKrutz, Daniel E., and Thomas Richards. "Cyber security education." ACM Inroads 8, no. 4 (October 27, 2017): 5. http://dx.doi.org/10.1145/3132217.
Full textStreater, K. "Cyber Security Challenge." ITNOW 52, no. 6 (November 1, 2010): 28. http://dx.doi.org/10.1093/itnow/bwq218.
Full textBennett, L. "Cyber Security Strategy." ITNOW 54, no. 1 (February 16, 2012): 10–11. http://dx.doi.org/10.1093/itnow/bws003.
Full textLinnhoff-Popien, Claudia. "2. Cyber security." Digitale Welt 2, no. 1 (December 21, 2017): 54. http://dx.doi.org/10.1007/s42354-018-0028-z.
Full textHarlander, Michaela. "Cyber Security – Weckruf." Digitale Welt 2, no. 2 (March 7, 2018): 7–8. http://dx.doi.org/10.1007/s42354-018-0062-x.
Full textLinnhoff-Popien, Claudia. "1. CYBER SECURITY." Digitale Welt 3, no. 2 (March 4, 2019): 54–55. http://dx.doi.org/10.1007/s42354-019-0172-0.
Full textLinnhoff-Popien, Claudia. "2. Cyber Security." Digitale Welt 4, no. 2 (March 11, 2020): 50–51. http://dx.doi.org/10.1007/s42354-020-0261-0.
Full textLinnhoff-Popien, Claudia. "1. Cyber Security." Digitale Welt 5, no. 1 (December 4, 2020): 16–17. http://dx.doi.org/10.1007/s42354-020-0315-3.
Full textSubba, Dhirodatta. "Cyber Security Management." SALESIAN JOURNAL OF HUMANITIES & SOCIAL SCIENCES 5, no. 2 (December 1, 2014): 101–8. http://dx.doi.org/10.51818/sjhss.05.2014.101-108.
Full textHojda, Mihaela Hortensia. "Information security economics: cyber security threats." Proceedings of the International Conference on Business Excellence 16, no. 1 (August 1, 2022): 584–92. http://dx.doi.org/10.2478/picbe-2022-0056.
Full textBekchonova, Shoira B. "PEDAGOGICAL FOUNDATIONS OF CYBER SECURITY." European International Journal of Multidisciplinary Research and Management Studies 02, no. 04 (April 1, 2022): 65–72. http://dx.doi.org/10.55640/eijmrms-02-04-14.
Full textCharan, Gopalam Venkata Sai. "An Overview of Cyber Security." International Journal of Research Publication and Reviews 5, no. 4 (April 28, 2024): 9293–96. http://dx.doi.org/10.55248/gengpi.5.0424.1127.
Full textGalinec, Darko. "Cyber Security and Cyber Defense: Challenges and Building of Cyber Resilience Conceptual Model." International Journal of Applied Sciences & Development 1 (March 1, 2023): 83–88. http://dx.doi.org/10.37394/232029.2022.1.10.
Full textKovács, László. "National Cyber Security as the Cornerstone of National Security." Land Forces Academy Review 23, no. 2 (June 1, 2018): 113–20. http://dx.doi.org/10.2478/raft-2018-0013.
Full textLehto, Martti. "The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies." International Journal of Cyber Warfare and Terrorism 3, no. 3 (July 2013): 1–18. http://dx.doi.org/10.4018/ijcwt.2013070101.
Full textRahman, S. R. "A Fussy Based Neural Genetic Algorithm for Securing Data in Cyber Security." International Journal on Future Revolution in Computer Science & Communication Engineering 8, no. 2 (June 30, 2022): 79–85. http://dx.doi.org/10.17762/ijfrcsce.v8i2.2081.
Full textRahul Kumar Jha, Sumina Neupane, and Roshan Raj Bhatt. "A Comprehensive Approach to Securing Power Converters: Cyber-Physical Integration." December 2023 2, no. 2 (December 2023): 256–87. http://dx.doi.org/10.36548/rrrj.2023.2.003.
Full textKohli, Arushi, and Akshay Raina. "Cyber Security Issues and Recommendations." Journal of Advance Research in Computer Science & Engineering (ISSN: 2456-3552) 1, no. 3 (March 31, 2014): 12–20. http://dx.doi.org/10.53555/nncse.v1i3.522.
Full textAkhtar, Noureen. "Emerging Cyber Security Challenges: Implications for Iranian National Security." BTTN Journal 2, no. 2 (December 30, 2023): 82–103. http://dx.doi.org/10.61732/bj.v2i2.58.
Full textvon Solms, Rossouw, and Johan van Niekerk. "From information security to cyber security." Computers & Security 38 (October 2013): 97–102. http://dx.doi.org/10.1016/j.cose.2013.04.004.
Full textPriya, Mrs A. Lakshmi, and S. Letitia. "Dual Watermarking in Cyber Security." JOURNAL OF ADVANCES IN CHEMISTRY 13, no. 10 (March 4, 2017): 5923–26. http://dx.doi.org/10.24297/jac.v13i10.5834.
Full textDol, Ganraj Rajendra. "A Research on Cyber Security And Cyber Coercion." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 20, 2021): 2110–12. http://dx.doi.org/10.22214/ijraset.2021.35455.
Full textPark, Soo-Youl, Wook-Jin Choi, Bo-Heung Chung, Jeong-Nyeo Kim, and Joo-Man Kim. "The Study on the Cyber Security Requirements of Cyber-Physical Systems for Cyber Security Frameworks." IEMEK Journal of Embedded Systems and Applications 7, no. 5 (October 31, 2012): 255–65. http://dx.doi.org/10.14372/iemek.2012.7.5.255.
Full textBURKADZE, Khatuna. "Cyber Security and International Law." Journal of Technical Science and Technologies 4, no. 2 (May 20, 2016): 5–10. http://dx.doi.org/10.31578/jtst.v4i2.75.
Full textvan der Meer, Sico. "Enhancing International Cyber Security." Security and Human Rights 26, no. 2-4 (December 7, 2015): 193–205. http://dx.doi.org/10.1163/18750230-02602004.
Full textQureshi, Kaif, Aditya Choudhary, Aakash Sharma, Anant Singh, and Kinjal Singh. "Investigating Dynamic Behavioral Analysis For Instantaneous Identification and Reduction of Changing Security Risks on the World Wide Web." International Journal of All Research Education and Scientific Methods 12, no. 05 (2024): 01–14. http://dx.doi.org/10.56025/ijaresm.2023.1205242072.
Full textFarid, Miftah, and Ajeng Ayu Adhisty. "STATE ACTION AS AN INDIVIDUAL SECURITY THREAT IN CASE OF CYBERCRIME SECURITIZATION." Jurnal Pertahanan 5, no. 3 (December 2, 2019): 77. http://dx.doi.org/10.33172/jp.v5i3.589.
Full text