Journal articles on the topic 'Cybersecurity frameworks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cybersecurity frameworks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Milagros B. Barruga. "Cybersecurity Strategy for Higher Education Institutions: A Thematic Analysis on Standards and Frameworks." Journal of Information Systems Engineering and Management 10, no. 43s (2025): 1140–52. https://doi.org/10.52783/jisem.v10i43s.8533.
Full textEleonora Anggi Ardhaninggar and Kallamulah Ramli. "A Review of Cybersecurity Framework Implementation for Retail Industry-Challenges and Recommendation." ARRUS Journal of Engineering and Technology 4, no. 2 (2024): 211–19. https://doi.org/10.35877/jetech3434.
Full textTaherdoost, Hamed. "Understanding Cybersecurity Frameworks and Information Security Standards—A Review and Comprehensive Overview." Electronics 11, no. 14 (2022): 2181. http://dx.doi.org/10.3390/electronics11142181.
Full textMelaku, Henock Mulugeta. "A Dynamic and Adaptive Cybersecurity Governance Framework." Journal of Cybersecurity and Privacy 3, no. 3 (2023): 327–50. http://dx.doi.org/10.3390/jcp3030017.
Full textAlghamdi, Ahmed. "Comparative Analysis of ISO27001 and NIST CSF." International Journal of Membrane Science and Technology 10, no. 4 (2023): 1423–29. http://dx.doi.org/10.15379/ijmst.v10i4.2258.
Full textLee, In. "Internet of Things (IoT) Cybersecurity: Literature Review and IoT Cyber Risk Management." Future Internet 12, no. 9 (2020): 157. http://dx.doi.org/10.3390/fi12090157.
Full textDedeke, Adenekan, and Katherine Masterson. "Contrasting cybersecurity implementation frameworks (CIF) from three countries." Information & Computer Security 27, no. 3 (2019): 373–92. http://dx.doi.org/10.1108/ics-10-2018-0122.
Full textVestad, Arnstein, and Bian Yang. "From Security Frameworks to Sustainable Municipal Cybersecurity Capabilities." Journal of Cybersecurity and Privacy 5, no. 2 (2025): 19. https://doi.org/10.3390/jcp5020019.
Full textMalatji, Masike, Annlizé L. Marnewick, and Suné Von Solms. "Cybersecurity capabilities for critical infrastructure resilience." Information & Computer Security 30, no. 2 (2021): 255–79. http://dx.doi.org/10.1108/ics-06-2021-0091.
Full textMalatji, Masike, Annlizé L. Marnewick, and Suné Von Solms. "Cybersecurity capabilities for critical infrastructure resilience." Information & Computer Security 30, no. 2 (2021): 255–79. http://dx.doi.org/10.1108/ics-06-2021-0091.
Full textMPHATHENI, Mandlenkosi Richard. "Cybersecurity: An Appraisal of Policy Frameworks and Related Conventions." International Journal of Information Security and Cybercrime 12, no. 1 (2023): 45–60. http://dx.doi.org/10.19107/ijisc.2023.01.06.
Full textAlSagri, Hatoon S., Shahab Saquib Sohail, and Shiju Sebastian. "The role of deep reinforcement learning in developing adaptive cybersecurity defenses for smart grid systems." Journal of Information and Optimization Sciences 45, no. 8 (2024): 2299–307. https://doi.org/10.47974/jios-1807.
Full textHidayatulloh, Syarif, and Aedah Binti Abd Rahman. "Balancing Cybersecurity Policies and Institutional Ethics: A Legal and Cultural Perspective on Higher Education Frameworks." Revista de Gestão Social e Ambiental 19, no. 1 (2025): e010788. https://doi.org/10.24857/rgsa.v19n1-049.
Full textShelly, Elizabeth. "Cybersecurity Frameworks for Cloud Computing Environments." International Journal of Computing and Engineering 6, no. 1 (2024): 30–44. http://dx.doi.org/10.47941/ijce.2058.
Full textPulatov, Temurbek. "Cybersecurity in Financial Technologies: Civil Law Measures for Prevention and Damage Compensation." Uzbek Journal of Law and Digital Policy 3, no. 3 (2025): 34–44. https://doi.org/10.59022/ujldp.338.
Full textBernardo, Luís, Silvestre Malta, and João Magalhães. "An Evaluation Framework for Cybersecurity Maturity Aligned with the NIST CSF." Electronics 14, no. 7 (2025): 1364. https://doi.org/10.3390/electronics14071364.
Full textAnkur Partap Kotwal. "Leveraging Big Data Analytics for Enhanced Cybersecurity: A Comprehensive Analysis of Threat Detection, Incident Response, and SIEM Systems." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 6 (2024): 2158–64. https://doi.org/10.32628/cseit2410612414.
Full textKamal, Aldin Yousif Yaseen, and Abdulrauof Osman Israa. "Security Staffing Strategic Plan for Organizations Security Posture Enhancement." International Journal of Innovative Science and Research Technology (IJISRT) 10, no. 2 (2025): 909–16. https://doi.org/10.5281/zenodo.14942742.
Full textFolorunsho, O. S., A. Q. Ayinde, M. A. Olagoke, and O. E. Fatoye. "Evaluating Cybersecurity Theories, Models, Standards and Frameworks." Advances in Multidisciplinary and scientific Research Journal Publication 5, no. 4 (2019): 61–66. http://dx.doi.org/10.22624/aims/bhi/v5n4p7.
Full textVon Solms, Sune. "The Identification of Cybersecurity Work Roles for the Water Sector in South Africa." European Conference on Cyber Warfare and Security 22, no. 1 (2023): 510–16. http://dx.doi.org/10.34190/eccws.22.1.1109.
Full textAbisoye, Ajayi, and Joshua Idowu Akerele. "A High-Impact Data-Driven Decision-Making Model for Integrating Cutting-Edge Cybersecurity Strategies into Public Policy, Governance, and Organizational Frameworks." International Journal of Multidisciplinary Research and Growth Evaluation 2, no. 1 (2021): 623–37. https://doi.org/10.54660/.ijmrge.2021.2.1.623-637.
Full textAbisoye, Ajayi, and Joshua Idowu Akerele. "A High-Impact Data-Driven Decision-Making Model for Integrating Cutting-Edge Cybersecurity Strategies into Public Policy, Governance, and Organizational Frameworks." International Journal of Multidisciplinary Research and Growth Evaluation 2, no. 1 (2021): 702–16. https://doi.org/10.54660/.ijmrge.2021.2.1.702-716.
Full textLawrence Damilare Oyeniyi, Chinonye Esther Ugochukwu, and Noluthando Zamanjomane Mhlongo. "DEVELOPING CYBERSECURITY FRAMEWORKS FOR FINANCIAL INSTITUTIONS: A COMPREHENSIVE REVIEW AND BEST PRACTICES." Computer Science & IT Research Journal 5, no. 4 (2024): 903–25. http://dx.doi.org/10.51594/csitrj.v5i4.1049.
Full textChowdhury, Rakibul Hasan. "Cybersecurity Accounting Frameworks for Critical Infrastructure Protection: Integrating Advanced Accounting Systems and Cybersecurity Protocols to Safeguard National Financial Data." International Journal of Management and Organizational Research 1, no. 1 (2022): 127–39. https://doi.org/10.54660/ijmor.2022.1.1.127-139.
Full textSrbaz, Nidham Othman, Mahmood Jawad Aqeel, Hameed Raed, Tomaa Kawad Raad, and Khlaponin Dmytro. "The impact of cybersecurity law in the middle east." ENCUENTROS. Revista de Ciencias Humanas, Teoría Social y Pensamiento Crítico. 23, Universidad Nacional Experimental Rafael Maria Baralt. (2024): 392–420. https://doi.org/10.5281/zenodo.14291287.
Full textJaiswal, Bhargav Dilipkumar. "Designing Scalable Software Automation Frameworks for Cybersecurity Threat Detection and Response." International Journal of Scientific Research and Management (IJSRM) 13, no. 02 (2025): 1958–80. https://doi.org/10.18535/ijsrm/v13i02.ec03.
Full textTemitayo Oluwaseun Abrahams, Sarah Kuzankah Ewuga, Simon Kaggwa `, Prisca Ugomma Uwaoma `, Azeez Olanipekun Hassan, and Samuel Onimisi Dawodu. "MASTERING COMPLIANCE: A COMPREHENSIVE REVIEW OF REGULATORY FRAMEWORKS IN ACCOUNTING AND CYBERSECURITY." Computer Science & IT Research Journal 5, no. 1 (2024): 120–40. http://dx.doi.org/10.51594/csitrj.v5i1.709.
Full textAnyanna, Iremise Fidel, Griffiths Onus, Uchenna Mikel-Olisa, and Noah Ayanbode. "Theoretical Frameworks for Addressing Cybersecurity Challenges in Financial Institutions: Lessons from Africa-US Collaborations." International Journal of Social Science Exceptional Research 3, no. 1 (2024): 51–55. https://doi.org/10.54660/ijsser.2024.3.1.51-55.
Full textTurk, Žiga, Muammer Semih Sonkor, and Robert Klinc. "CYBERSECURITY ASSESSMENT OF BIM/CDE DESIGN ENVIRONMENT USING CYBER ASSESSMENT FRAMEWORK." JOURNAL OF CIVIL ENGINEERING AND MANAGEMENT 28, no. 5 (2022): 349–64. http://dx.doi.org/10.3846/jcem.2022.16682.
Full textBabajide Tolulope Familoni and Philip Olaseni Shoetan. "CYBERSECURITY IN THE FINANCIAL SECTOR: A COMPARATIVE ANALYSIS OF THE USA AND NIGERIA." Computer Science & IT Research Journal 5, no. 4 (2024): 850–77. http://dx.doi.org/10.51594/csitrj.v5i4.1046.
Full textChinmay Mukeshbhai Gangani. "Cybersecurity Frameworks for Cloud-Hosted Financial Applications." Kuwait Journal of Software Design and Development 1, no. 1 (2024): 11–23. https://doi.org/10.52783/kjsdd.272.
Full textMooghala, Sridhar. "An In - Depth Analysis of Cybersecurity Frameworks for Payment Applications." International Journal of Science and Research (IJSR) 10, no. 8 (2021): 1250–54. http://dx.doi.org/10.21275/sr24304153706.
Full textAbhilash Maroju, Srinivas A Vaddadi, Sravanthi Dontu, Rohith Vallabhaneni,. "An Empirical Paradigm on Cybersecurity Vulnerability Mitigation Framework." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9s (2023): 786–92. http://dx.doi.org/10.17762/ijritcc.v11i9s.9484.
Full textFatai Adeshina Adelani, Enyinaya Stefano Okafor, Boma Sonimiteim Jacks, and Olakunle Abayomi Ajala. "THEORETICAL FRAMEWORKS FOR THE ROLE OF AI AND MACHINE LEARNING IN WATER CYBERSECURITY: INSIGHTS FROM AFRICAN AND U.S. APPLICATIONS." Computer Science & IT Research Journal 5, no. 3 (2024): 681–92. http://dx.doi.org/10.51594/csitrj.v5i3.928.
Full textHimanshu. "Cybersecurity Law: Challenges and Legal Frameworks for Protecting Digital Assets and Privacy Rights." Indian Journal of Law 2, no. 2 (2024): 18–22. http://dx.doi.org/10.36676/ijl.v2.i2.05.
Full textRahul Khanna. "Cybersecurity Law: Challenges and Legal Frameworks for Protecting Digital Assets and Privacy Rights." Indian Journal of Law 2, no. 3 (2024): 15–20. http://dx.doi.org/10.36676/ijl.v2.i3.28.
Full textSharma, Monu. "Cybersecurity Platforms: Tackling Challenges in a Digital Age." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 11 (2024): 1–9. http://dx.doi.org/10.55041/ijsrem12257.
Full textNejood Abedyasir ibadi. "Innovative Strategies for Enhancing Cybersecurity in Information Systems: A Holistic Approach in Computer Engineering." Journal of Information Systems Engineering and Management 10, no. 35s (2025): 826–39. https://doi.org/10.52783/jisem.v10i35s.6151.
Full textAdebimpe, Bolatito Ige, Kupa Eseoghene, and Ilori Oluwatosin. "Developing comprehensive cybersecurity frameworks for protecting green infrastructure: Conceptual models and practical applications." GSC Biological and Pharmaceutical Sciences 20, no. 1 (2024): 025–41. https://doi.org/10.5281/zenodo.13638293.
Full textPoonsawat, Thipphawan. "CYBER SECURITY IN THAILAND: A MISSION TOWARDS SAFETY IN THE DIGITAL AGE." Proceeding of International Conference on Social Science and Humanity 2, no. 2 (2025): 81–94. https://doi.org/10.61796/icossh.v2i2.21.
Full textRahul Kumar Jha, Amit Patel, and Birendra Kumar Shah. "Synergies and Challenges: Integrating Machine Learning, Blockchain Technology, and Regulatory Frameworks in Biomedical Cybersecurity." Journal of ISMAC 5, no. 3 (2023): 237–56. http://dx.doi.org/10.36548/jismac.2023.3.004.
Full textEsther Chinwe Eze, Shakirat O. Raji, Grace A. Durotolu, and Fen Danjuma John. "The role of AI in national cybersecurity policy and resilience planning: A comprehensive analysis of the United States' strategic approach." World Journal of Advanced Research and Reviews 27, no. 1 (2025): 1381–93. https://doi.org/10.30574/wjarr.2025.27.1.2656.
Full textZucca, Maria Vittoria, and Gaia Fiorinelli. "Regulating AI to Combat Tech-Crimes: Fighting the Misuse of Generative AI for Cyber Attacks and Digital Offenses." Technology and Regulation 2025 (July 2, 2025): 247–62. https://doi.org/10.71265/23nqtq40.
Full textEmmanni, Phani Sekhar. "Federated Learning for Cybersecurity in Edge and Cloud Computing." International Journal of Computing and Engineering 5, no. 4 (2024): 27–38. http://dx.doi.org/10.47941/ijce.1829.
Full textWallis, Tania, and Paul Dorey. "Implementing Partnerships in Energy Supply Chain Cybersecurity Resilience." Energies 16, no. 4 (2023): 1868. http://dx.doi.org/10.3390/en16041868.
Full textYunisa, Bintu, Safina Abdullahi Jantullu, and Offia Ogochukwu Judith. "OPERATION OF CYBER SECURITY IN TERTIARY INSTITUTION IN NIGERIA: PROBLEMS AND WAY FORWARD." Academic Journal Research 3, no. 1 (2025): 70–77. https://doi.org/10.61796/acjoure.v3i1.312.
Full textGummadi, Jaya Chandra Srikanth. "Cybersecurity in International Trade Agreements: A New Paradigm for Economic Diplomacy." American Journal of Trade and Policy 11, no. 1 (2024): 39–48. https://doi.org/10.18034/ajtp.v11i1.738.
Full textIbitamuno, Pamela Victor. "Legal Frameworks for Cybersecurity in Nigeria - Adapting The Fourth Industrial Revolution." Advances in Multidisciplinary and scientific Research Journal Publication 2, no. 1 (2023): 97–104. http://dx.doi.org/10.22624/aims/csean-smart2023p12.
Full textVenkata, Baladari. "Adaptive Cybersecurity Strategies: Mitigating Cyber Threats and Protecting Data Privacy." Journal of Scientific and Engineering Research 7, no. 8 (2020): 279–88. https://doi.org/10.5281/zenodo.15044844.
Full textAgboola, Oluwademilade Aderemi, Jeffrey Chidera Ogeawuchi, Oyinomomo-emi Emmanuel Akpe, and Abraham Ayodeji Abayomi. "A Conceptual Model for Integrating Cyber security and Intrusion Detection Architecture into Grid Modernization Initiatives." International Journal of Multidisciplinary Research and Growth Evaluation 3, no. 1 (2022): 1099–105. https://doi.org/10.54660/.ijmrge.2022.3.1.1099-1105.
Full text