Academic literature on the topic 'Cybersecurity frameworks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cybersecurity frameworks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cybersecurity frameworks"

1

Milagros B. Barruga. "Cybersecurity Strategy for Higher Education Institutions: A Thematic Analysis on Standards and Frameworks." Journal of Information Systems Engineering and Management 10, no. 43s (2025): 1140–52. https://doi.org/10.52783/jisem.v10i43s.8533.

Full text
Abstract:
Higher education institutions (HEIs) are increasingly vulnerable to cybersecurity attacks. As HEIs shift their operations online, they inevitably employ open systems and decentralized processing, making them particularly susceptible to cyberattacks. The study aims to identify the cybersecurity frameworks that HEIs currently employ as well as the characteristics that these frameworks must have. Initially, a comprehensive literature review was conducted to determine current cybersecurity practices and frameworks used by HEIs. This is followed by expert interviews with IT and cybersecurity profes
APA, Harvard, Vancouver, ISO, and other styles
2

Eleonora Anggi Ardhaninggar and Kallamulah Ramli. "A Review of Cybersecurity Framework Implementation for Retail Industry-Challenges and Recommendation." ARRUS Journal of Engineering and Technology 4, no. 2 (2024): 211–19. https://doi.org/10.35877/jetech3434.

Full text
Abstract:
Efforts to improve services by opening online data access to customers have become straightforward targets for cybercrime. Unfortunately, the researchers' findings reveal that there is presently no cybersecurity framework that completely aligns with the fundamental principles of the retail industry. This paper then analyzes the deployment of cybersecurity frameworks across various industrial sectors to determine which framework—or combination of frameworks—best aligns with the fundamental values of the retail industry. We compare the essential points of each cybersecurity framework with the TW
APA, Harvard, Vancouver, ISO, and other styles
3

Taherdoost, Hamed. "Understanding Cybersecurity Frameworks and Information Security Standards—A Review and Comprehensive Overview." Electronics 11, no. 14 (2022): 2181. http://dx.doi.org/10.3390/electronics11142181.

Full text
Abstract:
Businesses are reliant on data to survive in the competitive market, and data is constantly in danger of loss or theft. Loss of valuable data leads to negative consequences for both individuals and organizations. Cybersecurity is the process of protecting sensitive data from damage or theft. To successfully achieve the objectives of implementing cybersecurity at different levels, a range of procedures and standards should be followed. Cybersecurity standards determine the requirements that an organization should follow to achieve cybersecurity objectives and facilitate against cybercrimes. Cyb
APA, Harvard, Vancouver, ISO, and other styles
4

Melaku, Henock Mulugeta. "A Dynamic and Adaptive Cybersecurity Governance Framework." Journal of Cybersecurity and Privacy 3, no. 3 (2023): 327–50. http://dx.doi.org/10.3390/jcp3030017.

Full text
Abstract:
Cybersecurity protects cyberspace from a wide range of cyber threats to reduce overall business risk, ensure business continuity, and maximize business opportunities and return on investments. Cybersecurity is well achieved by using appropriate sets of security governance frameworks. To this end, various Information Technology (IT) and cybersecurity governance frameworks have been reviewed along with their benefits and limitations. The major limitations of the reviewed frameworks are; they are complex and have complicated structures to implement, they are expensive and require high skill IT an
APA, Harvard, Vancouver, ISO, and other styles
5

Alghamdi, Ahmed. "Comparative Analysis of ISO27001 and NIST CSF." International Journal of Membrane Science and Technology 10, no. 4 (2023): 1423–29. http://dx.doi.org/10.15379/ijmst.v10i4.2258.

Full text
Abstract:
Recent developments in Information and Communication Technology (ICT) have had a significant impact on commercial organizations in achieving their goals and objectives. However, the introduction of ICT introduced new cyber risks and threats as well. To mitigate cyber threats, various cybersecurity frameworks and standards are available e.g., ISO/IEC27001 and NIST Cybersecurity Framework (CSF). These frameworks can be used to measure/ audit the maturity level of an organization’s cybersecurity status. In this study, we have compared the ISO 27001 and NIST CSF and map these frameworks with each
APA, Harvard, Vancouver, ISO, and other styles
6

Lee, In. "Internet of Things (IoT) Cybersecurity: Literature Review and IoT Cyber Risk Management." Future Internet 12, no. 9 (2020): 157. http://dx.doi.org/10.3390/fi12090157.

Full text
Abstract:
Along with the growing threat of cyberattacks, cybersecurity has become one of the most important areas of the Internet of Things (IoT). The purpose of IoT cybersecurity is to reduce cybersecurity risk for organizations and users through the protection of IoT assets and privacy. New cybersecurity technologies and tools provide potential for better IoT security management. However, there is a lack of effective IoT cyber risk management frameworks for managers. This paper reviews IoT cybersecurity technologies and cyber risk management frameworks. Then, this paper presents a four-layer IoT cyber
APA, Harvard, Vancouver, ISO, and other styles
7

Dedeke, Adenekan, and Katherine Masterson. "Contrasting cybersecurity implementation frameworks (CIF) from three countries." Information & Computer Security 27, no. 3 (2019): 373–92. http://dx.doi.org/10.1108/ics-10-2018-0122.

Full text
Abstract:
Purpose This paper aims to explore the evolution of a trend in which countries are developing or adopting cybersecurity implementation frameworks that are intended to be used nationally. This paper contrasts the cybersecurity frameworks that have been developed in three countries, namely, Australia, UK and USA. Design/methodology/approach The paper uses literature review and qualitative document analysis for the study. The paper developed and used an assessment matrix as its coding protocol. The contents of the three cybersecurity frameworks were then scored to capture the degree to which they
APA, Harvard, Vancouver, ISO, and other styles
8

Vestad, Arnstein, and Bian Yang. "From Security Frameworks to Sustainable Municipal Cybersecurity Capabilities." Journal of Cybersecurity and Privacy 5, no. 2 (2025): 19. https://doi.org/10.3390/jcp5020019.

Full text
Abstract:
While security frameworks like the NIST CSF and ISO 27001 provide organizations with standardized best practices for cybersecurity, these practices must be implemented in organizations by people with the necessary skills and knowledge and be supported by effective technological solutions. This article explores the challenges and opportunities of building sustainable cybersecurity capabilities in resource-constrained organizations, specifically Norwegian municipalities. The research introduces the concept of sustainable cybersecurity capabilities, emphasizing the importance of a socio-technical
APA, Harvard, Vancouver, ISO, and other styles
9

Malatji, Masike, Annlizé L. Marnewick, and Suné Von Solms. "Cybersecurity capabilities for critical infrastructure resilience." Information & Computer Security 30, no. 2 (2021): 255–79. http://dx.doi.org/10.1108/ics-06-2021-0091.

Full text
Abstract:
Purpose For many innovative organisations, Industry 4.0 paves the way for significant operational efficiencies, quality of goods and services and cost reductions. One of the ways to realise these benefits is to embark on digital transformation initiatives that may be summed up as the intelligent interconnectivity of people, processes, data and cyber-connected things. Sadly, this interconnectivity between the enterprise information technology (IT) and industrial control systems (ICS) environment introduces new attack surfaces for critical infrastructure (CI) operators. As a result of the ICS cy
APA, Harvard, Vancouver, ISO, and other styles
10

Malatji, Masike, Annlizé L. Marnewick, and Suné Von Solms. "Cybersecurity capabilities for critical infrastructure resilience." Information & Computer Security 30, no. 2 (2021): 255–79. http://dx.doi.org/10.1108/ics-06-2021-0091.

Full text
Abstract:
Purpose For many innovative organisations, Industry 4.0 paves the way for significant operational efficiencies, quality of goods and services and cost reductions. One of the ways to realise these benefits is to embark on digital transformation initiatives that may be summed up as the intelligent interconnectivity of people, processes, data and cyber-connected things. Sadly, this interconnectivity between the enterprise information technology (IT) and industrial control systems (ICS) environment introduces new attack surfaces for critical infrastructure (CI) operators. As a result of the ICS cy
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Cybersecurity frameworks"

1

Murray, Glenn Kristian. "Managing cybersecurity risk for critical infrastructure: A framework to secure critical infrastructure." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2024. https://ro.ecu.edu.au/theses/2864.

Full text
Abstract:
As cyber threats continue to evolve, the protection of critical infrastructure has become a paramount concern, particularly considering the devastating potential these threats hold. The 2024 cyberattack on Change Healthcare, which resulted in significant financial losses for UnitedHealth, $870 million in the first quarter alone and up to $1.6 billion for the year, highlights the urgent need for effective cybersecurity measures to safeguard essential services. This thesis investigates the cybersecurity maturity of Australian critical infrastructure healthcare and, food and grocery sectors., foc
APA, Harvard, Vancouver, ISO, and other styles
2

Smith, Willarvis. "A Comprehensive Cybersecurity Defense Framework for Large Organizations." Diss., NSUWorks, 2019. https://nsuworks.nova.edu/gscis_etd/1083.

Full text
Abstract:
There is a growing need to understand and identify overarching organizational requirements for cybersecurity defense in large organizations. Applying proper cybersecurity defense will ensure that the right capabilities are fielded at the right locations to safeguard critical assets while minimizing duplication of effort and taking advantage of efficiencies. Exercising cybersecurity defense without an understanding of comprehensive foundational requirements instills an ad hoc and in many cases conservative approach to network security. Organizations must be synchronized across federal and civil
APA, Harvard, Vancouver, ISO, and other styles
3

Raina, Ravi. "A systems perspective on cybersecurity in the cloud : frameworks, metrics and migration strategy." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/107602.

Full text
Abstract:
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, School of Engineering, System Design and Management Program, Engineering and Management Program, 2016.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (pages 119-124).<br>Cloud computing represents the next generation of disruptive technologies in computing. However, there are several barriers to massive adoption of cloud and among them security remains one of the principal concerns. Traditional failure analysis and prevention frameworks fall exceedingly short to address cybersecu
APA, Harvard, Vancouver, ISO, and other styles
4

Yu, Xiaodong. "Algorithms and Frameworks for Accelerating Security Applications on HPC Platforms." Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/93510.

Full text
Abstract:
Typical cybersecurity solutions emphasize on achieving defense functionalities. However, execution efficiency and scalability are equally important, especially for real-world deployment. Straightforward mappings of cybersecurity applications onto HPC platforms may significantly underutilize the HPC devices' capacities. On the other hand, the sophisticated implementations are quite difficult: they require both in-depth understandings of cybersecurity domain-specific characteristics and HPC architecture and system model. In our work, we investigate three sub-areas in cybersecurity, including m
APA, Harvard, Vancouver, ISO, and other styles
5

Hedåker, Johanna. "Ramverk för cybersäkerhet: Möjligheter och begränsningar." Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20211.

Full text
Abstract:
I takt med samhällets snabba tekniska utveckling finns också ett behov av exponentiell utveckling av cybersäkerhet. Trender pekar dock på att så inte har skettoch antalet säkerhetsincidenter och intrång har på senare år ökat avsevärt. Tidigarestudier föreslår att dessa incidenter skulle kunna förhindras, eller åtminstone begränsas, genom tillämpningen av moderna säkerhetsramverk, där CIS Critical SecurityControls är ett av de mer kända.Syftet med denna studie är att genom en enkätundersökning granska existerandeåsikter bland yrkesverksamma inom säkerhetsbranschen om vikten och effekterna avatt
APA, Harvard, Vancouver, ISO, and other styles
6

Kuznietsova, Tetiania, and Andrii Chyrkov. "State and perspectives of aircraft cybersecurity." Thesis, National aviation university, 2021. https://er.nau.edu.ua/handle/NAU/50678.

Full text
Abstract:
During the latest events in the aviation world, where experts in the field of cybersecurity (example) opened the possibility of gaining access to the aircraft's on-board systems, industry experts (and not only) thought about it. And we are doing quite a lot. There are many existing guides that contain recommendations and practices, for example: «Software Considerations in Airborne Systems and Equipment Certification» contains recommendations for evaluating security and assuring software quality. There is a separation of access, because all systems are somehow connected to each other th
APA, Harvard, Vancouver, ISO, and other styles
7

Camporesi, Mirko. "Securopoly: un gioco per l'insegnamento della Cybersecurity." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/13274/.

Full text
Abstract:
All'interno della tesi sono presentati vari argomenti legati al mondo della sicurezza informatica e del suo insegnamento. Lo scopo di questo lavoro è presentare la tecnica della gamification e la sua applicazione nel panorama della cybersecurity moderna. Inoltre, viene proposto un gioco di società chiamato Securopoly che implementa le nozioni descritte e che è basato fortemente sul Framework Nazionale per la cybersecurity, un documento che pone gli standard che ogni organizzazione e ogni azienda dovrebbero soddisfare per essere all'avanguardia nel tentativo di difendersi da attacchi informatic
APA, Harvard, Vancouver, ISO, and other styles
8

Leon, Ryan James. "An Event Management Framework to Aid Solution Providers in Cybersecurity." Thesis, The George Washington University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10745141.

Full text
Abstract:
<p> Cybersecurity event management is critical to the successful accomplishment of an organization&rsquo;s mission. To put it in perspective, in 2016 Symantec tracked over 700 global adversaries and recorded events from 98 million sensors (Aimoto et al., 2017). Studies show that in 2015, more than 55% of the cyberattacks on government operation centers were due to negligence and the lack of skilled personnel to perform network security duties including the failure to properly identify events (Ponemon, 2015a). Practitioners are charged to perform as first responders to any event that affects th
APA, Harvard, Vancouver, ISO, and other styles
9

Snyder, Justin Charles. "A Framework and Exploration of a Cybersecurity Education Escape Room." BYU ScholarsArchive, 2018. https://scholarsarchive.byu.edu/etd/6958.

Full text
Abstract:
This thesis presents a review of educational-escape-room literature followed by a design-oriented framework (the Snyder Escape Room Framework or SERF) and demonstrates the potential efficacy of escape-rooms in cybersecurity education. Several authors have proposed frameworks and guidelines for game and educational design regarding escape rooms. This work coalesces some of those ideas into a more substantial and comprehensive framework (SERF) that designers can use when developing educational escape rooms. The Snyder Escape Room Framework provides heuristics for goals and objectives, players, a
APA, Harvard, Vancouver, ISO, and other styles
10

Newby, Chandler Ryan. "Designing Cybersecurity Competitions in the Cloud: A Framework and Feasibility Study." BYU ScholarsArchive, 2018. https://scholarsarchive.byu.edu/etd/7417.

Full text
Abstract:
Cybersecurity is an ever-expanding field. In order to stay current, training, development, and constant learning are necessary. One of these training methods has historically been competitions. Cybersecurity competitions provide a method for competitors to experience firsthand cybersecurity concepts and situations. These experiences can help build interest in, and improve skills in, cybersecurity. While there are diverse types of cybersecurity competitions, most are run with on-premise hardware, often centralized at a specific location, and are usually limited in scope by available hardware. T
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Cybersecurity frameworks"

1

United States. Congress. House. Committee on Homeland Security. Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies. Oversight of Executive Order 13636 and development of the cybersecurity framework: Hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, first session, July 18, 2013. U.S. Government Printing Office, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Maksurov, Aleksey. Ensuring information security on the Internet. INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1942595.

Full text
Abstract:
The monograph examines the features of legal relations in the field of information security in the global information space. The concept of "cybersecurity" is investigated, the institutional independence of the norms of law on ensuring security in the cyber environment is substantiated from the point of view of the subject and method of legal regulation. Considerable attention is paid to the characteristics of the sources of law on ensuring information security on the Internet. Substantial proposals have been made to improve legal regulation in this area both at the national (primarily Russian
APA, Harvard, Vancouver, ISO, and other styles
3

Shah, Imdad Ali, Samina Rajper, and Noor Zaman. Cybersecurity Measures for e-Government Frameworks. IGI Global, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zaman, Noor, Imdad Ali Shah, and Samina Rajper, eds. Cybersecurity Measures for E-Government Frameworks. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-7998-9624-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Shah, Imdad Ali, Samina Rajper, and Noor Zaman. Cybersecurity Measures for e-Government Frameworks. IGI Global, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Shah, Imdad Ali, Samina Rajper, and Noor Zaman. Cybersecurity Measures for e-Government Frameworks. IGI Global, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Shah, Imdad Ali, Samina Rajper, and Noor Zaman. Cybersecurity Measures for e-Government Frameworks. IGI Global, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shah, Imdad Ali, Samina Rajper, and Noor Zaman. Cybersecurity Measures for e-Government Frameworks. IGI Global, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Belli, Luca. CyberBRICS: Mapping Cybersecurity Frameworks in the BRICS. Springer International Publishing AG, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Quest to Cyber Superiority: Cybersecurity Regulations, Frameworks, and Strategies of Major Economies. Springer, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Cybersecurity frameworks"

1

Donaldson, Scott E., Stanley G. Siegel, Chris K. Williams, and Abdul Aslam. "Cybersecurity Frameworks." In Enterprise Cybersecurity. Apress, 2015. http://dx.doi.org/10.1007/978-1-4302-6083-7_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Weis, Dan. "Cybersecurity Frameworks." In Boardroom Cybersecurity. Apress, 2024. http://dx.doi.org/10.1007/979-8-8688-0785-5_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Manjikian, Mary. "Three Ethical Frameworks." In Cybersecurity Ethics, 2nd ed. Routledge, 2022. http://dx.doi.org/10.4324/9781003248828-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Donaldson, Scott E., Stanley G. Siegel, Chris K. Williams, and Abdul Aslam. "Mapping Against Cybersecurity Frameworks." In Enterprise Cybersecurity. Apress, 2015. http://dx.doi.org/10.1007/978-1-4302-6083-7_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Thompson, Eric C. "Incident Response Frameworks." In Cybersecurity Incident Response. Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3870-7_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Donaldson, Scott E., Stanley G. Siegel, Chris K. Williams, and Abdul Aslam. "Mapping Against Cybersecurity Frameworks." In Enterprise Cybersecurity Study Guide. Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3258-3_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Alexander, Richard D., and Srinivas Panguluri. "Cybersecurity Terminology and Frameworks." In Cyber-Physical Security. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-32824-9_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Loi, Michele, and Markus Christen. "Ethical Frameworks for Cybersecurity." In The International Library of Ethics, Law and Technology. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-29053-5_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Schoenherr, F. Jordan Richard, and Robert Thomson. "Ethical Frameworks for Cybersecurity." In The Frontlines of Artificial Intelligence Ethics. Routledge, 2022. http://dx.doi.org/10.4324/9781003030928-12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Deutscher, Stefan A., and William Yin. "Standards and Frameworks for Cybersecurity." In The Cyber Risk Handbook. John Wiley & Sons, Inc., 2017. http://dx.doi.org/10.1002/9781119309741.ch6.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cybersecurity frameworks"

1

Kumar Jain, Yogesh, CA Dhaarna Singh Rathore, Anjani Johrawanshi, Manish Gupta, Deepak Kumar Choudhary, and Ankur Pandey. "Cybersecurity Frameworks: A Roadmap for Business Resilience." In 2024 International Conference on Cybernation and Computation (CYBERCOM). IEEE, 2024. https://doi.org/10.1109/cybercom63683.2024.10803234.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

U, Kumaran, Naveen Tewari, Rashmi Choudhary, Diwakar Bhardwaj, Zaid Alsalami, and Jaishankar Bhatt. "Strengthening Cybersecurity Frameworks for Secure IoT Implementation." In 2024 International Conference on Communication, Computing and Energy Efficient Technologies (I3CEET). IEEE, 2024. https://doi.org/10.1109/i3ceet61722.2024.10993606.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Latoni, Anthony, and Xiaowen Zhang. "Enhancing Cybersecurity in Healthcare 5.0 Through Innovative Frameworks." In 2024 IEEE Long Island Systems, Applications and Technology Conference (LISAT). IEEE, 2024. https://doi.org/10.1109/lisat63094.2024.10808000.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Aljarrah, Sami Jamil, Sarra Cherbal, Ashraf Mashaleh, Jamal Al Karaki, and Amjad Gawanmeh. "On the Comparative Analysis of Trends in Cybersecurity Risk Assessment, Governance, and Compliance Frameworks." In 2024 International Jordanian Cybersecurity Conference (IJCC). IEEE, 2024. https://doi.org/10.1109/ijcc64742.2024.10847280.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hanson, Danielle, and Jeremy Straub. "A Systematic Review of Cybersecurity Audit Frameworks for the Internet of Things." In 2024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2024. http://dx.doi.org/10.1109/csr61664.2024.10679377.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

RR, Sornalakshmi, Petikam Sailaja, Siva Sai Sagar Majji, Teja Eshwar, Varshika S, and Shrinitha V. "Analysis of Critical Infrastructures for Cryptography Frameworks, Attacks, and Threats of Cybersecurity." In 2025 First International Conference on Advances in Computer Science, Electrical, Electronics, and Communication Technologies (CE2CT). IEEE, 2025. https://doi.org/10.1109/ce2ct64011.2025.10939300.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sharma, Mohini, Hiranmayee Kalita, Yasmin Ara Begum, Darpana Saikia, Rituparna Choudhury, and Monikha Saikia. "Cybersecurity And Ipr: Legal And Policy Frameworks For Innovation Management And Promotion." In 2024 Second International Conference Computational and Characterization Techniques in Engineering & Sciences (IC3TES). IEEE, 2024. https://doi.org/10.1109/ic3tes62412.2024.10877620.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Patil, Vijayta, Jhankar Moolchandani, and Ashutosh Kumar Dubey. "A Review on Advancing Cybersecurity Frameworks by Integrating Machine Intelligence with Federated Learning." In 2024 International Conference on IoT Based Control Networks and Intelligent Systems (ICICNIS). IEEE, 2024. https://doi.org/10.1109/icicnis64247.2024.10823300.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Vadisetty, Rahul, and Anand Polamarasetti. "Generative AI-Driven Distributed Cybersecurity Frameworks for AI-Integrated Global Big Data Systems." In 2024 International Conference on Emerging Technologies and Innovation for Sustainability (EmergIN). IEEE, 2024. https://doi.org/10.1109/emergin63207.2024.10961616.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ramesh, Keshav, Nikita Christ Miller, Aariz Faridi, Fadi Aloul, Imran Zualkernan, and Ali Reza Sajun. "Efficient Machine Learning Frameworks for Strengthening Cybersecurity in Internet of Medical Things (IoMT) Ecosystems." In 2024 IEEE International Conference on Internet of Things and Intelligence Systems (IoTaIS). IEEE, 2024. https://doi.org/10.1109/iotais64014.2024.10799438.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Cybersecurity frameworks"

1

Raza, Haider. Research work on cybersecurity frameworks. Iowa State University, 2020. http://dx.doi.org/10.31274/cc-20240624-1224.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Srinivasan, Piya. Strengthening cybersecurity frameworks remains a global challenge. Edited by Sam Hendricks. Monash University, 2023. http://dx.doi.org/10.54377/d1ef-9335.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pulivarti, Ronald. Genomic Data Cybersecurity and Privacy Frameworks Community Profile. National Institute of Standards and Technology, 2024. https://doi.org/10.6028/nist.ir.8467.2pd.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Pasupuleti, Murali Krishna. Securing AI-driven Infrastructure: Advanced Cybersecurity Frameworks for Cloud and Edge Computing Environments. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv225.

Full text
Abstract:
Abstract: The rapid adoption of artificial intelligence (AI) in cloud and edge computing environments has transformed industries by enabling large-scale automation, real-time analytics, and intelligent decision-making. However, the increasing reliance on AI-powered infrastructures introduces significant cybersecurity challenges, including adversarial attacks, data privacy risks, and vulnerabilities in AI model supply chains. This research explores advanced cybersecurity frameworks tailored to protect AI-driven cloud and edge computing environments. It investigates AI-specific security threats,
APA, Harvard, Vancouver, ISO, and other styles
5

David, Aharon. Unsettled Topics Concerning Airport Cybersecurity Standards and Regulation. SAE International, 2021. http://dx.doi.org/10.4271/epr2021020.

Full text
Abstract:
A large international airport is a microcosm of the entire aviation sector, hosting hundreds of different types of aviation and non-aviation stakeholders: aircraft, passengers, airlines, travel agencies, air traffic management and control, retails shops, runway systems, building management, ground transportation, and much more. Their associated information technology and cyber physical systems—along with an exponentially resultant number of interconnections—present a massive cybersecurity challenge. Unlike the physical security challenge, which was treated in earnest throughout the last decade
APA, Harvard, Vancouver, ISO, and other styles
6

Scarfone, Karen. Development of Relationship Mapping between Documentary Standards, Regulations, Frameworks, and Guidelines: Cybersecurity and Privacy Content Mapping. National Institute of Standards and Technology, 2023. http://dx.doi.org/10.6028/nist.ir.8477.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Scarfone, Karen. Development of Relationship Mapping between Documentary Standards, Regulations, Frameworks, and Guidelines: Cybersecurity and Privacy Content Mapping. National Institute of Standards and Technology, 2023. http://dx.doi.org/10.6028/nist.ir.8477.ipd.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Coyner, Kelley, and Jason Bittner. Automated Vehicles and Infrastructure Enablers: Cybersecurity. SAE International, 2024. http://dx.doi.org/10.4271/epr2024018.

Full text
Abstract:
&lt;div class="section abstract"&gt;&lt;div class="htmlview paragraph"&gt;While weaponizing automated vehicles (AVs) seems unlikely, cybersecurity breaches may disrupt automated driving systems’ navigation, operation, and safety—especially with the proliferation of vehicle-to-everything (V2X) technologies. The design, maintenance, and management of digital infrastructure, including cloud computing, V2X, and communications, can make the difference in whether AVs can operate and gain consumer and regulator confidence more broadly. Effective cybersecurity standards, physical and digital security
APA, Harvard, Vancouver, ISO, and other styles
9

Pasupuleti, Murali Krishna. Quantum Intelligence: Machine Learning Algorithms for Secure Quantum Networks. National Education Services, 2025. https://doi.org/10.62311/nesx/rr925.

Full text
Abstract:
Abstract: As quantum computing and quantum communication technologies advance, securing quantum networks against emerging cyber threats has become a critical challenge. Traditional cryptographic methods are vulnerable to quantum attacks, necessitating the development of AI-driven security solutions. This research explores the integration of machine learning (ML) algorithms with quantum cryptographic frameworks to enhance Quantum Key Distribution (QKD), post-quantum cryptography (PQC), and real-time threat detection. AI-powered quantum security mechanisms, including neural network-based quantum
APA, Harvard, Vancouver, ISO, and other styles
10

Pasupuleti, Murali Krishna. AI and Quantum-Nano Frontiers: Innovations in Health, Sustainability, Energy, and Security. National Education Services, 2025. https://doi.org/10.62311/nesx/rr525.

Full text
Abstract:
Abstract: This research report explores transformative advancements at the intersection of Artificial Intelligence (AI), Quantum Computing, and Nanotechnology, focusing on breakthrough innovations in health, sustainability, energy, and global security. By integrating quantum algorithms, AI-driven analytics, and advanced nanomaterials, this report highlights revolutionary solutions in precision medicine, predictive diagnostics, sustainable energy storage, universal water purification, and cybersecurity. Real-world case studies and emerging technologies such as graphene-based nanomaterials, quan
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!