Academic literature on the topic 'Cybersecurity'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cybersecurity.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cybersecurity"
Whyte, Jeffrey. "Cybersecurity, race, and the politics of truth." Security Dialogue 53, no. 4 (2022): 342–62. http://dx.doi.org/10.1177/09670106221101725.
Full textJohri, Amar, and Shailendra Kumar. "Exploring Customer Awareness towards Their Cyber Security in the Kingdom of Saudi Arabia: A Study in the Era of Banking Digital Transformation." Human Behavior and Emerging Technologies 2023 (January 12, 2023): 1–10. http://dx.doi.org/10.1155/2023/2103442.
Full textMaurer, Chris, Kevin Kim, Dan Kim, and Leon A. Kappelman. "Cybersecurity." Communications of the ACM 64, no. 2 (2021): 28–30. http://dx.doi.org/10.1145/3399667.
Full textRatnayake, Deepthi. "Cybersecurity." ITNOW 64, no. 2 (2022): 49. http://dx.doi.org/10.1093/itnow/bwac056.
Full textRatnayake, Deepthi. "Cybersecurity." ITNOW 64, no. 1 (2022): 37. http://dx.doi.org/10.1093/itnow/bwac019.
Full textPullin, Dennis W. "Cybersecurity." Frontiers of Health Services Management 35, no. 1 (2018): 3–12. http://dx.doi.org/10.1097/hap.0000000000000038.
Full textCACM Staff. "Cybersecurity." Communications of the ACM 60, no. 4 (2017): 20–21. http://dx.doi.org/10.1145/3051455.
Full textCampbell, Robert D. "Cybersecurity." ACM SIGCSE Bulletin 35, no. 2 (2003): 24–26. http://dx.doi.org/10.1145/782941.782965.
Full textBOHATY, ROCHELLE F. H. "CYBERSECURITY." Chemical & Engineering News 86, no. 44 (2008): 18–20. http://dx.doi.org/10.1021/cen-v086n044.p018.
Full textRatnayake, Deepthi. "Cybersecurity." ITNOW 64, no. 4 (2022): 39. http://dx.doi.org/10.1093/combul/bwac124.
Full textDissertations / Theses on the topic "Cybersecurity"
Poluzzi, Lorenzo. "IA & Cybersecurity." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020.
Find full textHoward, David J. "Development of the Cybersecurity Attitudes Scale and Modeling Cybersecurity Behavior and its Antecedents." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7306.
Full textLingelbach, Kembley Kay. "Perceptions of Female Cybersecurity Professionals Toward Factors that Encourage Females to the Cybersecurity Field." Diss., NSUWorks, 2018. https://nsuworks.nova.edu/gscis_etd/1056.
Full textNilsen, Richard. "Measuring Cybersecurity Competency: An Exploratory Investigation of the Cybersecurity Knowledge, Skills, and Abilities Necessary for Organizational Network Access Privileges." NSUWorks, 2017. http://nsuworks.nova.edu/gscis_etd/1017.
Full textReid, Rayne. "Guidelines for cybersecurity education campaigns." Thesis, Nelson Mandela University, 2017. http://hdl.handle.net/10948/14091.
Full textTagert, Adam C. "Cybersecurity Challenges in Developing Nations." Research Showcase @ CMU, 2010. http://repository.cmu.edu/dissertations/22.
Full textFalco, Gregory J. "Cybersecurity for urban critical infrastructure." Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/118226.
Full textPierce, Adam O. "Exploring the Cybersecurity Hiring Gap." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/3198.
Full textTaiola, Matteo. "Cybersecurity in impianti dell'industria di processo." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021.
Find full textSchluderberg, Larry E. "Addressing the cybersecurity Malicious Insider threat." Thesis, Utica College, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1571095.
Full textBooks on the topic "Cybersecurity"
Guiora, Amos N. Cybersecurity. Routledge, 2017. http://dx.doi.org/10.1201/9781315370231.
Full textKumar, Gautam, Om Prakash Singh, and Hemraj Saini. Cybersecurity. CRC Press, 2021. http://dx.doi.org/10.1201/9781003145042.
Full textAbd El-Latif, Ahmed A., and Christos Volos, eds. Cybersecurity. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-92166-8.
Full textBrooks, Charles J., Christopher Grow, Philip Craig, and Donald Short. Cybersecurity. John Wiley & Sons, Inc., 2018. http://dx.doi.org/10.1002/9781119369141.
Full textPrice, Tom. Cybersecurity. CQ Press, 2015. http://dx.doi.org/10.4135/cqr_ht_cybersecurity_2015.
Full textMarshall, Patrick. Cybersecurity. CQ Press, 2003. http://dx.doi.org/10.4135/cqrglobal20030926.
Full textDaim, Tugrul U., and Marina Dabić, eds. Cybersecurity. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-34843-3.
Full textMarshall, Patrick. Cybersecurity. CQ Press, 2010. http://dx.doi.org/10.4135/cqresrre20100226.
Full textJøsang, Audun. Cybersecurity. Springer Nature Switzerland, 2025. http://dx.doi.org/10.1007/978-3-031-68483-8.
Full textPraça, Isabel, Simona Bernardi, and Pedro R. M. Inácio, eds. Cybersecurity. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-94855-8.
Full textBook chapters on the topic "Cybersecurity"
Bishop, Gulsebnem. "Cybersecurity and cybersecurity culture." In Cybersecurity Culture. CRC Press, 2025. https://doi.org/10.1201/9781003368496-1.
Full textWichum, Ricky. "Cybersecurity." In Handbuch Virtualität. Springer Fachmedien Wiesbaden, 2020. http://dx.doi.org/10.1007/978-3-658-16342-6_36.
Full textWichum, Ricky. "Cybersecurity." In Handbuch Virtualität. Springer Fachmedien Wiesbaden, 2018. http://dx.doi.org/10.1007/978-3-658-16358-7_36-1.
Full textWolfe, Jennifer C. "Cybersecurity." In Disruption in the Boardroom. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6159-0_4.
Full textRefsdal, Atle, Bjørnar Solhaug, and Ketil Stølen. "Cybersecurity." In Cyber-Risk Management. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23570-7_4.
Full textRoy, Jeffrey. "Cybersecurity." In Public Administration and Information Technology. Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-7221-6_5.
Full textJackson, Scott, and Ricardo Moraes dos Santos. "Cybersecurity." In Systems Approach to the Design of Commercial Aircraft. CRC Press, 2020. http://dx.doi.org/10.1201/9781003053750-12.
Full textSiers, Rhea. "Cybersecurity." In Security Studies. Routledge, 2018. http://dx.doi.org/10.4324/9781315228358-38.
Full textIslam, Md Shariful. "Cybersecurity." In Routledge Companion to Global Cyber-Security Strategy. Routledge, 2020. http://dx.doi.org/10.4324/9780429399718-29.
Full textZaffar, Ehsan. "Cybersecurity." In Understanding Homeland Security. Routledge, 2019. http://dx.doi.org/10.4324/9780323296243-8.
Full textConference papers on the topic "Cybersecurity"
Taylor, Steve, Norbert Goetze, Joerg Abendroth, et al. "Cybersecurity Indicators Within a Cybersecurity Testing and Monitoring Framework." In 10th International Conference on Internet of Things, Big Data and Security. SCITEPRESS - Science and Technology Publications, 2025. https://doi.org/10.5220/0013465100003944.
Full textKyranoudi, Pinelopi, Nineta Polemi, Paresh Rathod, Ricardo Gregorio Lugo, Sotiris Ioannidis, and Paulinus Ofem. "Sectoral Cybersecurity Skills Gap: The Case of Maritime Cybersecurity Certification Training." In 2024 IEEE International Conference on Engineering, Technology, and Innovation (ICE/ITMC). IEEE, 2024. https://doi.org/10.1109/ice/itmc61926.2024.10794272.
Full textAlhassani, Mariam, Moatsum Alawida, and Hamzah Alamaireh. "ChatGPT in Cybersecurity: A Double-Sided Weapon within the Cybersecurity Realm." In 2025 1st International Conference on Computational Intelligence Approaches and Applications (ICCIAA). IEEE, 2025. https://doi.org/10.1109/icciaa65327.2025.11013583.
Full textCao, Xuanyu, Jiaxing Zhang, Peifeng Zheng, Shuai Bu, and Keshu Cheng. "Global Cybersecurity Situation Assessment Combining K-means Clustering and Cybersecurity Index." In 2025 5th International Symposium on Computer Technology and Information Science (ISCTIS). IEEE, 2025. https://doi.org/10.1109/isctis65944.2025.11066008.
Full textKemmerer, R. A. "Cybersecurity." In 25th International Conference on Software Engineering, 2003. Proceedings. IEEE, 2003. http://dx.doi.org/10.1109/icse.2003.1201257.
Full textMaymí, Fernando J. "Cybersecurity." In SIGITE '19: The 20th Annual Conference on Information Technology Education. ACM, 2019. http://dx.doi.org/10.1145/3349266.3355613.
Full textAbdulla, Aysha, Omer Bin Hussain, and Numa Fatima. "Cybersecurity." In 2024 International Conference on Artificial Intelligence, Computer, Data Sciences and Applications (ACDSA). IEEE, 2024. http://dx.doi.org/10.1109/acdsa59508.2024.10467741.
Full textde Bruin, Rossouw, and S. H. von Solms. "Humanitarian perspective of cybersecurity and cybersecurity governance." In 2017 IST-Africa Week Conference (IST-Africa). IEEE, 2017. http://dx.doi.org/10.23919/istafrica.2017.8102388.
Full textMurphy, Diane R., and Richard H. Murphy. "Teaching Cybersecurity." In the 2013. ACM Press, 2013. http://dx.doi.org/10.1145/2528908.2528913.
Full textXu, Shouhuai. "Cybersecurity dynamics." In the 2014 Symposium and Bootcamp. ACM Press, 2014. http://dx.doi.org/10.1145/2600176.2600190.
Full textReports on the topic "Cybersecurity"
Florakis, Chris, Christodoulos Louca, Roni Michaely, and Michael Weber. Cybersecurity Risk. National Bureau of Economic Research, 2020. http://dx.doi.org/10.3386/w28196.
Full textAlecu, Iulian, Costel Ciuchi, Toma Cimpeanu, et al. Cybersecurity Guide. Romanian Association for Information Security Assurance, 2021. http://dx.doi.org/10.19107/cybersec.2021.en.
Full textGuice, Leslie K. Cybersecurity Laboratory & Cybersecurity Research Program at the CRL. Defense Technical Information Center, 2014. http://dx.doi.org/10.21236/ada608802.
Full textNewhouse, William, Stephanie Keith, Benjamin Scribner, and Greg Witte. National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework. National Institute of Standards and Technology, 2017. http://dx.doi.org/10.6028/nist.sp.800-181.
Full textNIST, Gaithersburg MD. Using the Cybersecurity Framework to Minimize Emergent Cybersecurity Risk:. National Institute of Standards and Technology, 2025. https://doi.org/10.6028/nist.sp.1331.ipd.
Full textWright, Virginia, and Marc Sachs. Engineering-In Cybersecurity. Office of Scientific and Technical Information (OSTI), 2023. http://dx.doi.org/10.2172/1964083.
Full textLaSalle, Connie, Gema Howell, and Leilani Martinez. Cybersecurity for Research:. National Institute of Standards and Technology, 2025. https://doi.org/10.6028/nist.ir.8481.
Full textEliot, Daniel. Small Business Cybersecurity:. National Institute of Standards and Technology, 2025. https://doi.org/10.6028/nist.ir.7621r2.ipd.
Full textNewhouse, William, Stephanie Keith, Benjamin Scribner, and Greg Witte. National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (Portuguese translation). National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.sp.800-181pt.
Full textNewhouse, William, Stephanie Keith, Benjamin Scribner, and Greg Witte. National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (Spanish translation). National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.sp.800-181es.
Full text