Journal articles on the topic 'Cybersecurity certification'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cybersecurity certification.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Al Harrack, Micheline. "Connecting O*Net® Database to Cybersecurity Workforce Professional Certifications." International Journal on Integrating Technology in Education 10, no. 2 (2021): 65–76. http://dx.doi.org/10.5121/ijite.2021.10206.
Full textWang, Ping, and Hubert D'Cruze. "Certifications in Cybersecurity Workforce Development." International Journal of Hyperconnectivity and the Internet of Things 3, no. 2 (2019): 38–57. http://dx.doi.org/10.4018/ijhiot.2019070104.
Full textTsvilii, Olena. "Cybersecurity regulation: cybersecurity certification of operational technologies." Technology audit and production reserves 1, no. 2(57) (2021): 54–60. http://dx.doi.org/10.15587/2706-5448.2021.225271.
Full textOlena, Tsvilii. "Cybersecurity regulation: cybersecurity certification of operational technologies." Technology audit and production reserves 1, no. 2(57) (2021): 54–60. https://doi.org/10.15587/2706-5448.2021.225271.
Full textTsvilii, Olena. "SYSTEM OF CERTIFICATION OF CYBERSECURITY OF INFORMATION AND COMMUNICATIONS TECHNOLOGIES." Proceedings of the O.S. Popov ОNAT 1, no. 2 (2020): 121–34. http://dx.doi.org/10.33243/2518-7139-2020-1-2-121-134.
Full textMatheu-García, Sara Nieves, José Luis Hernández-Ramos, Antonio Skarmeta, and Gianmarco Baldini. "A Survey of Cybersecurity Certification for the Internet of Things." ACM Computing Surveys 53, no. 5 (2020): 1–36. https://doi.org/10.1145/3410160.
Full textHernández-Ramos, José Luis, Sara Nieves Matheu-García, and Antonio Skarmeta. "The Challenges of Software Cybersecurity Certification." IEEE Security & Privacy 19, no. 1 (2021): 99–102. https://doi.org/10.1109/MSEC.2020.3037845.
Full textAnanda, Safrida, Ika Putranti, and Andi Dir. "ANALYSIS OF THE EU CYBERSECURITY ACT UNDER THE THEORY OF NEOLIBERAL INSTITUTIONALISM." Arena Hukum 15, no. 1 (2022): 176–99. http://dx.doi.org/10.21776/ub.arenahukum.2022.01501.9.
Full textGunawan, Budi, Barito Mulyo Ratmono, Denok Kurniasih, and Paulus Israwan Setyoko. "Cybersecurity effectiveness: The role of internal auditor certification, risk assessment and senior management." International Journal of Data and Network Science 7, no. 4 (2023): 1805–14. http://dx.doi.org/10.5267/j.ijdns.2023.7.011.
Full textMitrakas, Andreas. "The emerging EU framework on cybersecurity certification." Datenschutz und Datensicherheit - DuD 42, no. 7 (2018): 411–14. http://dx.doi.org/10.1007/s11623-018-0969-2.
Full textColeman, Joe. "The DOD's CMMC 2.0: What Heat Treaters Need to Know." AM&P Technical Articles 182, no. 2 (2024): 37–39. http://dx.doi.org/10.31399/asm.amp.2024-02.p037.
Full textFleming, Courtney, Mark Reith, and Wayne Henry. "Securing Commercial Satellites for Military Operations: A Cybersecurity Supply Chain Framework." International Conference on Cyber Warfare and Security 18, no. 1 (2023): 85–92. http://dx.doi.org/10.34190/iccws.18.1.1062.
Full textNikolov, Borislav. "Maritime Cybersecurity Education and Training at Nikola Vaptsarov Naval Academy." Pedagogika-Pedagogy 95, no. 6s (2023): 48–55. http://dx.doi.org/10.53656/ped2023-6s.05.
Full textRazikin, Khairur, and Agus Widodo. "General Cybersecurity Maturity Assessment Model: Best Practice to Achieve Payment Card Industry-Data Security Standard (PCI-DSS) Compliance." CommIT (Communication and Information Technology) Journal 15, no. 2 (2021): 91–104. http://dx.doi.org/10.21512/commit.v15i2.6931.
Full textNwankwo, Iheanyi, Marc Stauch, Panagiotis Radoglou-Grammatikis, et al. "Data Protection and Cybersecurity Certification Activities and Schemes in the Energy Sector." Electronics 11, no. 6 (2022): 965. http://dx.doi.org/10.3390/electronics11060965.
Full textKret, T. B., A. Z. Piskozub, and P. V. Stasiv. "RESEARCH OF COMPLIANCE WITH CYBER ESSENTIALS REQUIREMENTS FOR COMPANY'S CERTIFICATION." Computer systems and network 7, no. 1 (2025): 176–85. https://doi.org/10.23939/csn2025.01.176.
Full textDawson, Maurice. "Applying a holistic cybersecurity framework for global IT organizations." Business Information Review 35, no. 2 (2018): 60–67. http://dx.doi.org/10.1177/0266382118773624.
Full textHernandez-Ramos, Jose L., Sara N. Matheu, and Antonio Skarmeta. "The Challenges of Software Cybersecurity Certification [Building Security In]." IEEE Security & Privacy 19, no. 1 (2021): 99–102. http://dx.doi.org/10.1109/msec.2020.3037845.
Full textKipker, Dennis-Kenji. "EU Cybersecurity Act und Certification Schemes: ein aktueller Fortschrittsbericht." Datenschutz und Datensicherheit - DuD 44, no. 4 (2020): 263–65. http://dx.doi.org/10.1007/s11623-020-1264-6.
Full textTsikteris, Sean, Odyssefs Diamantopoulos Pantaleon, and Eirini Eleni Tsiropoulou. "Cybersecurity Certification Requirements for Distributed Energy Resources: A Survey of SunSpec Alliance Standards." Energies 17, no. 19 (2024): 5017. http://dx.doi.org/10.3390/en17195017.
Full textNowrozy, Raza. "GPTs or Grim Position Threats? The Potential Impacts of Large Language Models on Non-Managerial Jobs and Certifications in Cybersecurity." Informatics 11, no. 3 (2024): 45. http://dx.doi.org/10.3390/informatics11030045.
Full textLevy, Yair, and Ruti Gafni. "Towards the quantification of cybersecurity footprint for SMBs using the CMMC 2.0." Online Journal of Applied Knowledge Management 10, no. 1 (2022): 43–61. http://dx.doi.org/10.36965/ojakm.2022.10(1)43-61.
Full textRegueiro, Cristina, and Borja Urquizu. "Blockchain-Based Evidence Trustworthiness System in Certification." Journal of Cybersecurity and Privacy 5, no. 1 (2024): 1. https://doi.org/10.3390/jcp5010001.
Full textParth, Kasurde, Nikorawalla Haftaandad, and Tandon Rudraksh. "Cybersecurity: Firewalls, Protocols, Needs & Algorithm." International Journal of Innovative Science and Research Technology 8, no. 1 (2023): 233–36. https://doi.org/10.5281/zenodo.7556200.
Full textMartinez, Cristina, Iñaki Etxaniz, Alberto Molinuevo, and Juncal Alonso. "MEDINA Catalogue of Cloud Security controls and metrics: Towards Continuous Cloud Security compliance." Open Research Europe 4 (April 24, 2024): 90. http://dx.doi.org/10.12688/openreseurope.16669.1.
Full textMatheu, Sara N., Jose L. Hernandez-Ramos, and Antonio F. Skarmeta. "Toward a Cybersecurity Certification Framework for the Internet of Things." IEEE Security & Privacy 17, no. 3 (2019): 66–76. http://dx.doi.org/10.1109/msec.2019.2904475.
Full textMatheu, Sara N., José L. Hernández-Ramos, Antonio F. Skarmeta, and Gianmarco Baldini. "A Survey of Cybersecurity Certification for the Internet of Things." ACM Computing Surveys 53, no. 6 (2020): 1–36. http://dx.doi.org/10.1145/3410160.
Full textIslam, Md Shariful, Nusrat Farah, and Thomas F. Stafford. "Factors associated with security/cybersecurity audit by internal audit function." Managerial Auditing Journal 33, no. 4 (2018): 377–409. http://dx.doi.org/10.1108/maj-07-2017-1595.
Full textMatheu-García, Sara Nieves, José Luis Hernández-Ramos, Antonio F. Skarmeta, and Gianmarco Baldini. "Risk-based automated assessment and testing for the cybersecurity certification and labelling of IoT devices." Computer Standards & Interfaces 62 (February 1, 2019): 64–83. https://doi.org/10.1016/j.csi.2018.08.003.
Full textDeCusatis, Casimer, Raymond Tomo, Aurn Singh, Emile Khoury, and Andrew Masone. "Cybersecurity Applications of Near-Term Large Language Models." Electronics 14, no. 13 (2025): 2704. https://doi.org/10.3390/electronics14132704.
Full textBenyahya, Meriem, Anastasija Collen, and Niels Alexander Nijdam. "Cybersecurity and Data Privacy Certification Gaps of Connected and Automated Vehicles." Transportation Research Procedia 72 (2023): 783–90. http://dx.doi.org/10.1016/j.trpro.2023.11.468.
Full textMatheu, Sara N., Juan F. Martínez-Gil, Irene Bicchierai, Jan Marchel, Radosław Piliszek, and Antonio Skarmeta. "A Flexible Risk-Based Security Evaluation Methodology for Information Communication Technology System Certification." Applied Sciences 15, no. 3 (2025): 1600. https://doi.org/10.3390/app15031600.
Full textKipker, Dennis-Kenji. "EU Cybersecurity Act and Certification Schemes: an up-to-date progress report." Datenschutz und Datensicherheit - DuD 44, no. 6 (2020): 390–92. http://dx.doi.org/10.1007/s11623-020-1290-4.
Full textMincewicz, Wojciech. "EDUCATION IN THE FIELD OF CYBERSECURITY AT UNIVERSITIES IN POLAND." Zeszyty Naukowe SGSP 86 (June 26, 2023): 117–25. http://dx.doi.org/10.5604/01.3001.0053.7149.
Full textOday, Oday, Esraa Saleh Alomari, Ali Nafea Yousif, Oday Ali Hassen, Saad M. Darwish, and Yu Yu Gromov. "Type-2 Neutrosophic Ontology for Automated Essays Scoring in Cybersecurity Education." Journal of Cybersecurity and Information Management 15, no. 2 (2025): 293–304. https://doi.org/10.54216/jcim.150222.
Full textFarrand, Benjamin, Helena Carrapico, and Aleksei Turobov. "The new geopolitics of EU cybersecurity: security, economy and sovereignty." International Affairs 100, no. 6 (2024): 2379–97. http://dx.doi.org/10.1093/ia/iiae231.
Full textAzzani, Ihsania Karin, Susilo Adi Purwantoro, and Hikmat Zakky Almubarok. "Enhancing awareness of cyber crime: a crucial element in confronting the challenges of hybrid warfare In Indonesia." Defense and Security Studies 5 (January 5, 2024): 1–9. http://dx.doi.org/10.37868/dss.v5.id255.
Full textPuchkov, Oleksandr, and Оlena Uvarkina. "Sustainable development of the system of formal cyber education: reflection of modern concepts." Collection "Information Technology and Security" 11, no. 1 (2023): 60–68. http://dx.doi.org/10.20535/2411-1031.2023.11.1.283635.
Full textRampášek, Michal, Matúš Mesarčík, and Jozef Andraško. "Evolving cybersecurity of AI-featured digital products and services: Rise of standardisation and certification?" Computer Law & Security Review 56 (April 2025): 106093. https://doi.org/10.1016/j.clsr.2024.106093.
Full textVaidyanathan R. Iyer. "Institutionalizing Trust in Healthcare Cybersecurity: A Qualitative Analysis of Cyber Assurance and Investment Readiness." Journal of Information Systems Engineering and Management 10, no. 3 (2025): 1864–78. https://doi.org/10.52783/jisem.v10i3.8754.
Full textApriyanto, Apriyanto, Siti Mudawanah, Edi Sutanto, Adi Dwi Purnomo, and Muhammad Wahid Murniawan. "Auditing in the Era of Cybersecurity: Challenges and Solutions." Journal Markcount Finance 2, no. 2 (2024): 285–95. https://doi.org/10.70177/jmf.v2i2.1291.
Full textFidelis Othuke Onyekwe, Oladipo Odujobi, Friday Emmanuel Adikwu, and Tari Yvonne Elete. "Innovative approaches to enhancing functional safety in Distributed Control Systems (DCS) and Safety Instrumented Systems (SIS) for Oil and Gas Applications." Open Access Research Journal of Multidisciplinary Studies 3, no. 1 (2022): 106–12. https://doi.org/10.53022/oarjms.2022.3.1.0027.
Full textMatheu-García, Sara N., José L. Hernández-Ramos, Antonio F. Skarmeta, and Gianmarco Baldini. "Risk-based automated assessment and testing for the cybersecurity certification and labelling of IoT devices." Computer Standards & Interfaces 62 (February 2019): 64–83. http://dx.doi.org/10.1016/j.csi.2018.08.003.
Full textGuan, Ran. "Future Era of Accountants under the Impact of AI." SHS Web of Conferences 218 (2025): 03028. https://doi.org/10.1051/shsconf/202521803028.
Full textКУТОВА, Марина. "МОДЕЛЬ СТРАТЕГІЧНОГО ПЛАНУВАННЯ РОЗВИТКУ СИСТЕМИ ЕЛЕКТРОННОГО УРЯДУВАННЯ В КОНТЕКСТІ ЗАБЕЗПЕЧЕННЯ ІНФОРМАЦІЙНОЇ БЕЗПЕКИ". Herald of Khmelnytskyi National University. Economic sciences 342, № 3(1) (2025): 12–16. https://doi.org/10.31891/2307-5740-2025-342-3(1)-1.
Full textBotha-Badenhorst, Danielle, André Martin McDonald, Graham David Barbour, Ethan Buckinjohn, and Wian Gertenbach. "On The Zero-Trust Intranet Certification Problem." International Conference on Cyber Warfare and Security 19, no. 1 (2024): 10–18. http://dx.doi.org/10.34190/iccws.19.1.2054.
Full textTretiak, Yurii. "System of subjects of administrative and legal support of cybersecurity." Visnik Nacional’nogo universitetu «Lvivska politehnika». Seria: Uridicni nauki 11, no. 42 (2024): 197–205. http://dx.doi.org/10.23939/law2024.42.197.
Full textIto, Kosuke, Shuji Morisaki, and Atsuhiro Goto. "IoT Security-Quality-Metrics Method and Its Conformity with Emerging Guidelines." IoT 2, no. 4 (2021): 761–85. http://dx.doi.org/10.3390/iot2040038.
Full textU.E., Akpan,, and Okoye O. "Cybersecurity in the Petroleum Industry: A Comprehensive Review of Threats and Mitigation Strategies." Journal of Engineering Research and Reports 26, no. 12 (2024): 261–70. https://doi.org/10.9734/jerr/2024/v26i121356.
Full textRohit, Singh Raja. "Securing Healthcare Data: A Systematic Review of Compliance, Privacy, and Cybersecurity Strategies." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 9, no. 6 (2023): 1–13. https://doi.org/10.5281/zenodo.14838616.
Full text