Journal articles on the topic 'Cybersecurity dashboard'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cybersecurity dashboard.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Shaikh, Arafat Tabrez. "An Innovative Approach to Job Placement through a Training and Placement Portal." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem46264.
Full textS., Yaswanthraj, Adhithyan M., Kowshik T., Logha Surya N., and Mihaash Dharan M. "URLs Threat Identification Dashboard." Research and Reviews: Advancement in Cyber Security 2, no. 2 (2025): 41–50. https://doi.org/10.5281/zenodo.15573303.
Full textClarke, Karla, Yair Levy, Laurie Dringus, and Shonda Brown. "How workplace satisfaction affects insider threat detection as a vital variable for the mitigation of malicious cyber insiders." Online Journal of Applied Knowledge Management 7, no. 1 (2019): 40–52. http://dx.doi.org/10.36965/ojakm.2019.7(1)40-52.
Full textSaeed, Saqib, Sarah A. Suayyid, Manal S. Al-Ghamdi, Hayfa Al-Muhaisen, and Abdullah M. Almuhaideb. "A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience." Sensors 23, no. 16 (2023): 7273. http://dx.doi.org/10.3390/s23167273.
Full textEspinha Gasiba, Tiago, Ulrike Lechner, and Maria Pinto-Albuquerque. "Cybersecurity Challenges in Industry: Measuring the Challenge Solve Time to Inform Future Challenges." Information 11, no. 11 (2020): 533. http://dx.doi.org/10.3390/info11110533.
Full textBalogun, Adebayo Yusuf. "Strengthening Compliance with Data Privacy Regulations in U.S. Healthcare Cybersecurity." Asian Journal of Research in Computer Science 18, no. 1 (2025): 154–73. https://doi.org/10.9734/ajrcos/2025/v18i1555.
Full textSubha K, Benitlin. "AI-Driven Cybersecurity Model for Real-Time Threat Detection and Prevention." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem47712.
Full textS, KAVIYA. "REAL-TIME FIREWALL EVENT ALERT SYSTEM FOR NETWORK PROTECTION." International Scientific Journal of Engineering and Management 04, no. 04 (2025): 1–7. https://doi.org/10.55041/isjem02862.
Full textOgunmolu, Akinde Michael. "Leveraging Generative AI and Behavioral Biometrics to Strengthen Zero Trust Cybersecurity Architectures in Healthcare Systems." Journal of Engineering Research and Reports 27, no. 5 (2025): 194–213. https://doi.org/10.9734/jerr/2025/v27i51502.
Full textAhmad, Siti Arpah, Muhammad Al’Imran Mohd Khairuddin, Nor Shahniza Kamal Bashah, and Nurul Aishah Ab Raman. "An integrated framework for data breach on the dark web in brand monitoring data hunting." International Journal of Electrical and Computer Engineering (IJECE) 15, no. 3 (2025): 3162. https://doi.org/10.11591/ijece.v15i3.pp3162-3170.
Full textDR. K. Maharajan, Mugeshwaran K, Dumala Nithish, Dinesh S, and Uday N. "Threat Intelligence Platform Empowered by Generative Ai with Quantum-Security." International Research Journal on Advanced Engineering Hub (IRJAEH) 3, no. 04 (2025): 1336–42. https://doi.org/10.47392/irjaeh.2025.0190.
Full textBerríos, Sebastián, Sebastián Garcia, Pamela Hermosilla, and Héctor Allende-Cid. "A Machine-Learning-Based Approach for the Detection and Mitigation of Distributed Denial-of-Service Attacks in Internet of Things Environments." Applied Sciences 15, no. 11 (2025): 6012. https://doi.org/10.3390/app15116012.
Full textMohammed Razmirahman khan, Mohammed safiuddin, Syed Faisal, and Mohammed Rahmat Ali. "Ai Based Cyber Security Assistant For Non -Technical Users." International Journal of Information Technology and Computer Engineering 13, no. 2s (2025): 560–66. https://doi.org/10.62647/ijitce2025v13i2spp560-566.
Full textsankar U, Dhilip. "AUTOMATED DDOS SIMULATION IN A VIRTUAL ENVIRONMENT USING PYTHON AND TELEGRAM BOT." International Scientific Journal of Engineering and Management 04, no. 04 (2025): 1–7. https://doi.org/10.55041/isjem02959.
Full textJEYAPRAKASH S, Mr. "Cyber Threat Intelligence for Industrial Control System." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem46481.
Full textAlHaddad, Ulaa, Abdullah Basuhail, Maher Khemakhem, Fathy Elbouraey Eassa, and Kamal Jambi. "Ensemble Model Based on Hybrid Deep Learning for Intrusion Detection in Smart Grid Networks." Sensors 23, no. 17 (2023): 7464. http://dx.doi.org/10.3390/s23177464.
Full textOlawale, Habeeb Olatunji, Ngozi Joan Isibor, and Joyce Efekpogua Fiemotongha. "A Predictive Compliance Analytics Framework Using AI and Business Intelligence for Early Risk Detection." International Journal of Management and Organizational Research 2, no. 2 (2023): 190–95. https://doi.org/10.54660/ijmor.2023.2.2.190-195.
Full textSaepudin, Asep, Dzahra Al Madinah, Makhsun Makhsun, and Taswanda Taryo. "ANALISIS DAN PENGEMBANGAN SISTEM MONITORING RADIOAKTIF ALAMIAH RADON MENGGUNAKAN DETEKTOR SINTILASI BERBASIS WEB SECARA REAL TIME." Infotech: Journal of Technology Information 11, no. 1 (2025): 137–46. https://doi.org/10.37365/jti.v11i1.384.
Full textOkunlola, Folasade. "Integrating Emergency Data Management Systems in Energy and Natural Resources Industries." International Journal of Business and Management 3, no. 1 (2024): 1–7. https://doi.org/10.70560/j1ch2v40.
Full textFolasade, Okunlola. "Integrating Emergency Data Management Systems in Energy and Natural Resources Industries." International Journal of Environmental Science and Sustainability 2, no. 1 (2023): 11–16. https://doi.org/10.70560/t6n7fh13.
Full textKhan, Mohd Imran, Aditya Kadu, Rahul Hulke, et al. "Artisan Hub." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem43061.
Full textHamada, Razi, and Ievgeniia Kuzminykh. "Exploitation Techniques of IoST Vulnerabilities in Air-Gapped Networks and Security Measures—A Systematic Review." Signals 4, no. 4 (2023): 687–707. http://dx.doi.org/10.3390/signals4040038.
Full textQin, T., C. Li, and G. F. Liu. "Control infrastructure monitoring system at the NSRL facility cluster." Journal of Instrumentation 17, no. 11 (2022): P11005. http://dx.doi.org/10.1088/1748-0221/17/11/p11005.
Full textDr. G. Vasavi, G. T. S. Satyanarayana, B. Vivek Sai, and B. Chaitanya S. S. Phani. "Design and Implementation of Smart-H Pot: A Custom Intrusion Detection System." International Research Journal on Advanced Engineering Hub (IRJAEH) 3, no. 04 (2025): 1851–56. https://doi.org/10.47392/irjaeh.2025.0268.
Full textAnil Kumar Pakina. "AI Governance via Explainable Reinforcement Learning (XRL) for Adaptive Cyber Deception in Zero-Trust Networks." Journal of Information Systems Engineering and Management 10, no. 43s (2025): 98–115. https://doi.org/10.52783/jisem.v10i43s.8308.
Full textDziubanovska, Nataliia, and Ivan Tsegelnyy. "Digital tools for ensuring transparency in investment attraction: challenges and opportunities for post-war Ukraine." Economic Analysis, no. 35(1) (2025): 525–35. https://doi.org/10.35774/econa2025.01.525.
Full textEkaterina, Kapustina. "Corporate Governance in the Context of Business Digital Transformation." American Journal of Management and Economics Innovations 07, no. 05 (2025): 90–98. https://doi.org/10.37547/tajmei/volume07issue05-11.
Full textKirti, Vasdev. "Building Geospatial Dashboards for IT Decision-Making." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 6, no. 4 (2020): 1–6. https://doi.org/10.5281/zenodo.14384096.
Full textAlfaadhel, Afnan, Iman Almomani, and Mohanned Ahmed. "Risk-Based Cybersecurity Compliance Assessment System (RC2AS)." Applied Sciences 13, no. 10 (2023): 6145. http://dx.doi.org/10.3390/app13106145.
Full textRahanuma Tarannum, Sakhawat Hussain Tanim, Md Sabbir Ahmad, and Md Manarat Uddin Mithun. "Business analytics for IT infrastructure projects: Optimizing performance and security." International Journal of Science and Research Archive 14, no. 3 (2025): 783–92. https://doi.org/10.30574/ijsra.2025.14.3.0729.
Full textShelke, Palvi, and Tapio Frantti. "Exploring the Possibilities of Splunk Enterprise Security in Advanced Cyber Threat Detection." International Conference on Cyber Warfare and Security 20, no. 1 (2025): 605–13. https://doi.org/10.34190/iccws.20.1.3326.
Full textSrikanth Yerra. "Enhancing Inventory Management through Real-Time Power BI Dashboards and KPI Tracking." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 944–51. https://doi.org/10.32628/cseit25112458.
Full textChignell, Mark H., Mu-Huan Chung, Yuhong Yang, Greg Cento, and Abhay Raman. "Human Factors in Interactive Machine Learning: A Cybersecurity Case Study." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 65, no. 1 (2021): 1495–99. http://dx.doi.org/10.1177/1071181321651206.
Full textKumar, Aman, Nikhil Rathod J,, Sandeep Achar, Chandan P. Shirni, and Kishore K R. "Optimizing Student and Faculty Experiences Through University Management Platforms." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 01 (2025): 1–9. https://doi.org/10.55041/ijsrem40530.
Full textLezhanina, Viktoriia. "Peculiarities of Auditing Small and Medium-Sized Enterprises in the Context of Digitalization." Universal Library of Business and Economics 02, no. 01 (2025): 49–53. https://doi.org/10.70315/uloap.ulbec.2025.0201009.
Full textNăstasă, Iulian, Mihaela Mandu, and Dana-Galieta Mincă. "Confidentiality of Medical Data in the Proposed Romanian National Cardiac Rehabilitation Registry: Ethical, Technical, and Legal Considerations." Balneo and PRM Research Journal 16, Vol 16 No. 2 (2025): 826. https://doi.org/10.12680/balneo.2025.826.
Full textMr. D. Pavun kumar, Mr. K. Gokul, Mr. PA. Janamithran, Mr. B. Kalanidhi Kadhirr, and Mr. R. Lokesh. "Al-Orchestrated Intelligent Microcredit Framework for Optimized Financial Accessibility and Proactive Risk Mitigation." International Research Journal on Advanced Engineering Hub (IRJAEH) 3, no. 04 (2025): 1971–80. https://doi.org/10.47392/irjaeh.2025.0288.
Full textOluoha, Oluchukwu Modesta, Abisola Odeshina, Oluwatosin Reis, Friday Okpeke, Verlinda Attipoe, and Omamode Henry Orieno. "AI-Enabled Framework for Zero Trust Architecture and Continuous Access Governance in Security-Sensitive Organizations." International Journal of Social Science Exceptional Research 3, no. 1 (2024): 343–64. https://doi.org/10.54660/ijsser.2024.3.1.343-364.
Full textMa, Zhiyuan, Shumeng Zhang, and Zhiyu Liu. "Digital Twin Technology: A Comprehensive Overview of Concepts, Applications, and Innovations." Undergraduate Research in Natural and Clinical Science and Technology (URNCST) Journal 9, no. 6 (2025): 1–7. https://doi.org/10.26685/urncst.877.
Full textKabahing, Sepfanner, Rikie Kartadie, Sigit Aditomo, Ivònia Fàtima Ruas Da silva, Francisco Xavier, and Nur aini Nur aini. "Prediction of Cyber Attack Losses by Attack Type and Country with Visual Approach and Quantitative Statistics." Journal of Intelligent Software Systems 4, no. 1 (2025): 5. https://doi.org/10.26798/jiss.v4i1.2002.
Full textChibogwu Igwe-Nmaju and Chidozie Anadozie. "Digital trust and communication in tech-critical industries: Frameworks for managing stakeholder confidence at scale or commanding digital trust in high-stakes sectors: Communication strategies for sustaining stakeholder confidence amid technological ris." World Journal of Advanced Research and Reviews 15, no. 3 (2022): 609–30. https://doi.org/10.30574/wjarr.2022.15.3.0920.
Full textAjayi, Ajibola Joshua, Oluwole Oluwadamilola Agbede, Experience Efeosa Akhigbe, and Nnaemeka Stanley Egbuhuzor. "Enhancing Public Sector Productivity with AI-Powered SaaS in E-Governance Systems." International Journal of Judicial Law 3, no. 1 (2024): 76–92. https://doi.org/10.54660/ijjl.2024.3.1.76-92.
Full textNnaemeka Stanley Egbuhuzor, Ajibola Joshua Ajayi, Experience Efeosa Akhigbe, and Oluwole Oluwadamilola Agbede. "Leveraging AI and cloud solutions for energy efficiency in large-scale manufacturing." International Journal of Science and Research Archive 13, no. 2 (2024): 4170–92. https://doi.org/10.30574/ijsra.2024.13.2.2314.
Full textAjayi, Ajibola Joshua, Oluwole Oluwadamilola Agbede, Experience Efeosa Akhigbe, and Nnaemeka Stanley Egbuhuzor. "Enhancing Public Sector Productivity with AI-Powered SaaS in E-Governance Systems." International Journal of Multidisciplinary Research and Growth Evaluation 5, no. 1 (2024): 1243–59. https://doi.org/10.54660/.ijmrge.2024.5.1-1243-1259.
Full textNuruzzaman, Md, and Sohel Rana. "IOT-ENABLED CONDITION MONITORING IN POWER DISTRIBUTION SYSTEMS: A REVIEW OF SCADA-BASED AUTOMATION, REAL-TIME DATA ANALYTICS, AND CYBER-PHYSICAL SECURITY CHALLENGES." Journal of Sustainable Development and Policy 01, no. 01 (2025): 25–43. https://doi.org/10.63125/pyd1x841.
Full textShete, Shriyash. "Information Visualization for a Comprehensive Cybersecurity Risk Quantification and Measurement." Journal of Artificial Intelligence & Cloud Computing, June 30, 2023, 1–5. http://dx.doi.org/10.47363/jaicc/2023(2)170.
Full textShete, Shriyash. "Visualizing Data Security with AI/ML-Powered Data Classification." Journal of Artificial Intelligence & Cloud Computing, December 31, 2022, 1–4. http://dx.doi.org/10.47363/jaicc/2022(1)172.
Full textG, Manjula, Samhith G, Kartik Lutimath, Monisha Raj H N, and Preethi K R. "A Hybrid Machine Learning Approach for Network Intrusion Detection with Real-Time Visualization." Indian Journal of Computer Science and Technology, May 10, 2025, 91–100. https://doi.org/10.59256/indjcst.20250402009.
Full textS. Abdulaziz, Rafid. "RESOLVE PROBLEMS FACING APPLICATION PROGRAMMING INTERFACES (APIS) IN THE WAZUH (SIEM) SOLUTION." Anbar Journal of Modern Sciences, February 15, 2025, 32–42. https://doi.org/10.63298/ajms.2025.186488.
Full textSharma, Madhav, and Roger McHaney. "Bots and insights: Combining perspectives of analytics and software development in systems analysis and design projects." Decision Sciences Journal of Innovative Education 23, no. 2 (2025). https://doi.org/10.1111/dsji.70005.
Full text