Academic literature on the topic 'Cybersecurity Measures'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cybersecurity Measures.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cybersecurity Measures"
Kissoon, Tara. "Optimum spending on cybersecurity measures." Transforming Government: People, Process and Policy 14, no. 3 (2020): 417–31. http://dx.doi.org/10.1108/tg-11-2019-0112.
Full textTalekar, P. R. "Cybersecurity Measures for Financial Data." International Journal of Advance and Applied Research 5, no. 10 (2024): 1–5. https://doi.org/10.5281/zenodo.11296420.
Full textNnenna, Ugwu Jovita, Ugwuanyi Ifeoma Perpetua, Asuma Mariita Nchaga, Tushabe Hadijah, Eric Mabonga, and Tom Ongesa Nyamboga. "Cybersecurity Measures in East African EGovernment Systems." IAA JOURNAL OF SOCIAL SCIENCES 10, no. 2 (2024): 12–24. http://dx.doi.org/10.59298/iaajss/2024/102.122400000.
Full textSharma, Ravinder, and Rajvir Saini. "Analysis for Network Security Measures for Protecting Organizational Data." Journal of Lifestyle and SDGs Review 4, no. 4 (2024): e03599. http://dx.doi.org/10.47172/2965-730x.sdgsreview.v4.n04.pe03599.
Full textRoss, Lester, and Kenneth Zhou. "China issues new cybersecurity review measures." Journal of Investment Compliance 22, no. 1 (2021): 47–52. http://dx.doi.org/10.1108/joic-10-2020-0039.
Full textM. Kolesnikova. "Key Cybersecurity Measures in African Countries." International Affairs 68, no. 005 (2022): 140–44. http://dx.doi.org/10.21557/iaf.80763118.
Full textMishra, Neha. "The Trade: (Cyber)Security Dilemma and Its Impact on Global Cybersecurity Governance." Journal of World Trade 54, Issue 4 (2020): 567–90. http://dx.doi.org/10.54648/trad2020025.
Full textOlamide Raimat Amosu, Praveen Kumar, Yewande Mariam Ogunsuji, Adesola Adelaja, Oladapo Faworaja, and Kikelomo Adetula. "Enhanced cybersecurity measures: Protect customer data in e-commerce and retail industry." World Journal of Advanced Research and Reviews 23, no. 2 (2024): 890–900. http://dx.doi.org/10.30574/wjarr.2024.23.2.2408.
Full textOlamide, Raimat Amosu, Kumar Praveen, Mariam Ogunsuji Yewande, Adelaja Adesola, Faworaja Oladapo, and Adetula Kikelomo. "Enhanced cybersecurity measures: Protect customer data in e-commerce and retail industry." World Journal of Advanced Research and Reviews 23, no. 2 (2024): 890–900. https://doi.org/10.5281/zenodo.14848480.
Full textAnwuli Nkemchor Obiki-Osafiele, Edith Ebele Agu, and Njideka Rita Chiekezie. "Protecting digital assets in Fintech: Essential cybersecurity measures and best practices." Computer Science & IT Research Journal 5, no. 8 (2024): 1884–96. http://dx.doi.org/10.51594/csitrj.v5i8.1449.
Full textDissertations / Theses on the topic "Cybersecurity Measures"
Reid, Rayne. "Guidelines for cybersecurity education campaigns." Thesis, Nelson Mandela University, 2017. http://hdl.handle.net/10948/14091.
Full textGcaza, Noluxolo. "A national strategy towards cultivating a cybersecurity culture in South Africa." Thesis, Nelson Mandela University, 2017. http://hdl.handle.net/10948/13735.
Full textCheung, Kam Fung. "A Three Stage Approach to Cybersecurity Management for Logistics." Thesis, The University of Sydney, 2021. https://hdl.handle.net/2123/24945.
Full textKamongi, Patrick. "Ontology Based Security Threat Assessment and Mitigation for Cloud Systems." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1404576/.
Full textCornel, Caralea May. "A Methodology to Measure the Impact of Diversity on Cybersecurity Team Effectiveness." BYU ScholarsArchive, 2019. https://scholarsarchive.byu.edu/etd/8594.
Full textRodrigue, Tiina K. O. "The Power and Politics of Cybersecurity: A Quantitative Study of Federal Cash Windfall Allocation as a Measure of Impact on Comprehensive Cybersecurity Posture." Thesis, The George Washington University, 2021. http://pqdtopen.proquest.com/#viewpdf?dispub=28152128.
Full textGwala, Sizwe. "Barriers to implementation of the (SA) National Cybersecurity Policy Framework." Thesis, 2016. https://hdl.handle.net/10539/23802.
Full textPatala, Najiyabanu Noormohmed. "Cybersecurity framework for cloud computing adoption in rural based tertiary institutions." Diss., 2018. http://hdl.handle.net/11602/1362.
Full textBooks on the topic "Cybersecurity Measures"
Pino, Robinson E. Network science and cybersecurity. Springer Science+Business Media, 2014.
Find full textCheong, Damien Dominic. Cybersecurity: Some critical insights and perspectives. RSIS, S. Rajaratnam School of International Studies, Nanyang Technological University, 2015.
Find full textAmerican Bar Association. Section of Science & Technology Law, ed. Legal guide to cybersecurity research. American Bar Association, Section of Science & Technology Law, 2013.
Find full textToscana, Romana. Cybersecurity: The Beginner's Guide to Cybersecurity Measures. Indy Pub, 2023.
Find full textEllis, Ryan, and Vivek Mohan. Rewired: Cybersecurity Governance. Wiley & Sons, Incorporated, John, 2019.
Find full textEllis, Ryan, and Vivek Mohan. Rewired: Cybersecurity Governance. Wiley & Sons, Incorporated, John, 2019.
Find full textBrooks, Charles J., Philip Craig, Christopher Grow, and Donald Short. Cybersecurity Essentials. Wiley & Sons, Incorporated, John, 2018.
Find full textBrooks, Charles J., Philip Craig, Christopher Grow, and Donald Short. Cybersecurity Essentials. Wiley & Sons, Limited, John, 2018.
Find full textBook chapters on the topic "Cybersecurity Measures"
Kissoon, Tara. "Cybersecurity Principles." In Optimal Spending on Cybersecurity Measures. CRC Press, 2025. https://doi.org/10.1201/9781003587569-3.
Full textAl-khateeb, Samer, and Nitin Agarwal. "Social Network Measures and Analysis." In SpringerBriefs in Cybersecurity. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-13690-1_2.
Full textKissoon, Tara. "Cybersecurity Risk Management Framework." In Optimal Spending on Cybersecurity Measures. CRC Press, 2024. http://dx.doi.org/10.1201/9781003497523-6.
Full textKissoon, Tara. "Cybersecurity risk-management framework." In Optimal Spending on Cybersecurity Measures. Routledge, 2021. http://dx.doi.org/10.4324/9781003200895-7.
Full textKissoon, Tara. "Cybersecurity Risk Management Framework." In Optimal Spending on Cybersecurity Measures. CRC Press, 2025. https://doi.org/10.1201/9781003587576-7.
Full textKissoon, Tara. "Cybersecurity Risk Management Framework." In Optimal Spending on Cybersecurity Measures. CRC Press, 2025. https://doi.org/10.1201/9781003587569-7.
Full textKissoon, Tara. "Cybersecurity Risk Management Framework." In Optimal Spending on Cybersecurity Measures. CRC Press, 2025. https://doi.org/10.1201/9781003527213-6.
Full textThompson, Eric C. "Selecting Security Measures." In Building a HIPAA-Compliant Cybersecurity Program. Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-3060-2_3.
Full textKissoon, Tara. "Data Protection Impact Assessment." In Optimal Spending on Cybersecurity Measures. CRC Press, 2024. http://dx.doi.org/10.1201/9781003497523-4.
Full textKissoon, Tara. "Governance." In Optimal Spending on Cybersecurity Measures. CRC Press, 2024. http://dx.doi.org/10.1201/9781003497523-5.
Full textConference papers on the topic "Cybersecurity Measures"
Khare, Shanu, and Navjot Singh Talwandi. "Securing Satellite Communication: Exploring Cybersecurity Measures in Satellite Networks." In 2024 OPJU International Technology Conference (OTCON) on Smart Computing for Innovation and Advancement in Industry 4.0. IEEE, 2024. http://dx.doi.org/10.1109/otcon60325.2024.10687961.
Full textSharma, Rishabh, and Abhishek Singla. "Optimizing Cloud Security: A Study of Effective Cybersecurity Measures for Organizations." In 2024 International Conference on IoT Based Control Networks and Intelligent Systems (ICICNIS). IEEE, 2024. https://doi.org/10.1109/icicnis64247.2024.10823273.
Full textHammer Né Bauer, Sergei, and Peter Schartner. "Functional Safety Evaluation for Cybersecurity Measures in Low-End Automotive Control Units." In 2024 11th International Conference on Dependable Systems and Their Applications (DSA). IEEE, 2024. https://doi.org/10.1109/dsa63982.2024.00023.
Full textAli, Tariq Emad, Mohd Najwadi Yusoff, Yung-Wey Chong, Mohd Heikal Husin, and Noor Farizah Ibrahim. "Enhanced Cybersecurity Measures: DDoS Attacks Detection in Realtime with Advanced SVM Techniques." In 2024 7th International Seminar on Research of Information Technology and Intelligent Systems (ISRITI). IEEE, 2024. https://doi.org/10.1109/isriti64779.2024.10963367.
Full textWahed, Mutaz Abdel, Mowafaq Salem Alzboon, Muhyeeddin Alqaraleh, Azmi Halasa, Mohammad Al-Batah, and Ahmad Fuad Bader. "Comprehensive Assessment of Cybersecurity Measures: Evaluating Incident Response, AI Integration, and Emerging Threats." In 2024 7th International Conference on Internet Applications, Protocols, and Services (NETAPPS). IEEE, 2024. https://doi.org/10.1109/netapps63333.2024.10823603.
Full textSaravanan, T. M., A. Muthusamy, C. P. Thamil Selvi, M. Senthil Kumar, and D. Maheshwari. "Improving Cybersecurity Measures Through the Revelation of Malignant URLs using Machine Learning Techniques." In 2024 5th International Conference on Data Intelligence and Cognitive Informatics (ICDICI). IEEE, 2024. https://doi.org/10.1109/icdici62993.2024.10810759.
Full textGeetha, B. T., Mohammed Usman, Neetu Randhawa, Lalit Pipliwal, Kajal Maheshwari, and Neha Kapila. "Revolutionizing the Dynamics of Digital Marketing by Including Cybersecurity Measures and Safeguarding Consumer Data." In 2024 International Conference on Trends in Quantum Computing and Emerging Business Technologies (TQCEBT). IEEE, 2024. http://dx.doi.org/10.1109/tqcebt59414.2024.10545098.
Full textU, Sreekumar, Urmila Patil, and Rajashree R. Bhokre. "Cybersecurity and Functional Safety Measures Need to be Introduced in the Communication Protocol between EV and EVSE." In 2025 IEEE International Conference on Interdisciplinary Approaches in Technology and Management for Social Innovation (IATMSI). IEEE, 2025. https://doi.org/10.1109/iatmsi64286.2025.10984548.
Full textChipuriro, Francisca, Sam Takavarasha, and Benny Nyambo. "Exploring the Cybersecurity Measures Implemented by Internet Service Providers (ISPs) to Mitigate Cyberthreats: A Systematic Literature Review." In 2024 3rd Zimbabwe Conference of Information and Communication Technologies (ZCICT). IEEE, 2024. https://doi.org/10.1109/zcict63770.2024.10958504.
Full textBolun, Ion. "Prioritization of Cybersecurity Measures." In 11th International Conference on “Electronics, Communications and Computing". Technical University of Moldova, 2022. http://dx.doi.org/10.52326/ic-ecco.2021/sec.01.
Full textReports on the topic "Cybersecurity Measures"
Hariharan, Anand, and Masatake (Masa) Yamamichi. Basic Tool Kit for Cybersecurity in Education Management Information Systems. Asian Development Bank, 2024. http://dx.doi.org/10.22617/wps240301-2.
Full textTaiber, Joachim. Unsettled Topics Concerning the Impact of Quantum Technologies on Automotive Cybersecurity. SAE International, 2020. http://dx.doi.org/10.4271/epr2020026.
Full textSaalman, Lora, Fei Su, and Larisa Saveleva Dovgal. Cyber Crossover and Its Escalatory Risks for Europe. Stockholm International Peace Research Institute, 2023. http://dx.doi.org/10.55163/siep1930.
Full textReducing Cybersecurity Risks at the Organization’s Endpoints: Cybersecurity Best Practices. Inter-American Development Bank, 2024. http://dx.doi.org/10.18235/0013085.
Full textIn Hot Water? The Growing Threat of Cyber Attacks to Water Distribution Systems. American Society of Civil Engineers, 2022. http://dx.doi.org/10.1061/infographic.000003.
Full text