Academic literature on the topic 'Cybersecurity resilience'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cybersecurity resilience.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cybersecurity resilience"

1

Priyandita, Gatra. "Indonesia's Cybersecurity Resilience." Asia Policy 20, no. 2 (2025): 25–34. https://doi.org/10.1353/asp.2025.a960040.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tasdighi, Anahita. "Cyber-Resilient Autonomous Spacecraft: A MultiDomain Resilience Framework for Deep Space Missions." American Journal of Science, Engineering and Technology 10, no. 2 (2025): 40–66. https://doi.org/10.11648/j.ajset.20251002.11.

Full text
Abstract:
This article introduces a pioneering Multi-Domain Resilience Framework (MDRF) to address the escalating cybersecurity challenges faced by autonomous spacecraft operating in the demanding and unpredictable environments of deep space. It underscores the necessity of a holistic approach that integrates cybersecurity, operational resilience, physical security, and supply chain integrity to safeguard critical missions against an array of cyber threats, including malware, data interception, and insider vulnerabilities. Leveraging insights from prominent missions like NASA's Artemis program
APA, Harvard, Vancouver, ISO, and other styles
3

Malatji, Masike, Annlizé L. Marnewick, and Suné Von Solms. "Cybersecurity capabilities for critical infrastructure resilience." Information & Computer Security 30, no. 2 (2021): 255–79. http://dx.doi.org/10.1108/ics-06-2021-0091.

Full text
Abstract:
Purpose For many innovative organisations, Industry 4.0 paves the way for significant operational efficiencies, quality of goods and services and cost reductions. One of the ways to realise these benefits is to embark on digital transformation initiatives that may be summed up as the intelligent interconnectivity of people, processes, data and cyber-connected things. Sadly, this interconnectivity between the enterprise information technology (IT) and industrial control systems (ICS) environment introduces new attack surfaces for critical infrastructure (CI) operators. As a result of the ICS cy
APA, Harvard, Vancouver, ISO, and other styles
4

Malatji, Masike, Annlizé L. Marnewick, and Suné Von Solms. "Cybersecurity capabilities for critical infrastructure resilience." Information & Computer Security 30, no. 2 (2021): 255–79. http://dx.doi.org/10.1108/ics-06-2021-0091.

Full text
Abstract:
Purpose For many innovative organisations, Industry 4.0 paves the way for significant operational efficiencies, quality of goods and services and cost reductions. One of the ways to realise these benefits is to embark on digital transformation initiatives that may be summed up as the intelligent interconnectivity of people, processes, data and cyber-connected things. Sadly, this interconnectivity between the enterprise information technology (IT) and industrial control systems (ICS) environment introduces new attack surfaces for critical infrastructure (CI) operators. As a result of the ICS cy
APA, Harvard, Vancouver, ISO, and other styles
5

Tagarev, Todor, and George Sharkov. "Multi-stakeholder Approach to Cybersecurity and Resilience." Information & Security: An International Journal 34 (2016): 59–68. http://dx.doi.org/10.11610/isij.3404.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wallis, Tania, and Paul Dorey. "Implementing Partnerships in Energy Supply Chain Cybersecurity Resilience." Energies 16, no. 4 (2023): 1868. http://dx.doi.org/10.3390/en16041868.

Full text
Abstract:
This study describes the implementation of an energy sector community to examine the practice of cybersecurity for operational technology environments and their supply chains. Evaluating cybersecurity from the perspectives of different actors participating in the energy sector, the progress and challenges of operators and suppliers in delivering cybersecurity for the sector are explored. While regulatory frameworks incentivize individual organizations to improve their cybersecurity, operational services contain contributions from many organizations, and this supply chain of activity needs to b
APA, Harvard, Vancouver, ISO, and other styles
7

Venkadesh, Dr P. "Aegis AI - Intelligent Cyber Resilience." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem42978.

Full text
Abstract:
As cyber threats continue to evolve in complexity and scale, traditional security measures have become insufficient. Aegis AI (AAI): Intelligent Cyber Resilience presents a cutting-edge approach that integrates artificial intelligence (AI) and machine learning (ML) to strengthen cybersecurity defenses. This study explores the role of AI-driven threat intelligence, automated incident response, and adaptive learning in combating cyberattacks. The proposed AAI framework utilizes deep learning, anomaly detection, and reinforcement learning techniques to predict and mitigate threats in real time. B
APA, Harvard, Vancouver, ISO, and other styles
8

SMAJIĆ, Nermin. "Human Element in Cybersecurity. Strategies for Building a Stronger and More Secure Workforce." International Journal of Information Security and Cybercrime 12, no. 1 (2023): 30–36. http://dx.doi.org/10.19107/ijisc.2023.01.04.

Full text
Abstract:
Today, many businesses, organizations, and individuals rely on the internet for operations, communications, and transactions. As such, cybersecurity has become a major concern, as it is the key to protecting sensitive data and protecting against potential cyberattacks. Resilient companies understand the importance of cybersecurity, and leverage key pillars of cybersecurity to ensure their security and resilience. This article will highlight what cybersecurity is and how resilient companies leverage it, highlight the benefits of resilient cybersecurity, and some possible strategies for improvin
APA, Harvard, Vancouver, ISO, and other styles
9

Sharkov, George. "Assessing the Maturity of National Cybersecurity and Resilience." Connections: The Quarterly Journal 19, no. 4 (2020): 5–24. http://dx.doi.org/10.11610/connections.19.4.01.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Alnaffar, Ahmed. "Cybersecurity Resilience Awareness in the Era of AI." International Journal of Science and Research (IJSR) 13, no. 3 (2024): 244–45. http://dx.doi.org/10.21275/sr24305145928.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Cybersecurity resilience"

1

Munk, Tine Hojsgaard. "Cyber-security in the European region : anticipatory governance and practices." Thesis, University of Manchester, 2015. https://www.research.manchester.ac.uk/portal/en/theses/cybersecurity-in-the-european-region-anticipatory-governance-and-practices(6658eec7-cc61-4c84-9054-ea40cf405ed9).html.

Full text
Abstract:
This thesis explores the nature of cyber-security at the beginning of the 21st century. In the current security paradigm, security strategies based on anticipatory governance have become essential in the management of the constantly changing cyber-security environment. Thus, this thesis aims to understand security strategies and governance introduced in the European region. The increased dependency on cyber-space is visible in all public-private sectors and governmental operations, as well as communications between groups and individuals. As a result, cyber-attacks on public and private entiti
APA, Harvard, Vancouver, ISO, and other styles
2

McManus, Ian Patrick. "The Impact of Cyberattacks on Safe and Efficient Operations of Connected and Autonomous Vehicles." Thesis, Virginia Tech, 2021. http://hdl.handle.net/10919/104891.

Full text
Abstract:
The landscape of vehicular transportation is quickly shifting as emerging technologies continue to increase in intelligence and complexity. From the introduction of Intelligent Transportation Systems (ITS) to the quickly developing field of Connected and Autonomous Vehicles (CAVs), the transportation industry is experiencing a shift in focus. A move to more autonomous and intelligent transportation systems brings with it a promise of increased equity, efficiency, and safety. However, one aspect that is overlooked in this shift is cybersecurity. As intelligent systems and vehicles have been in
APA, Harvard, Vancouver, ISO, and other styles
3

Ghnaya, Imed. "Résilience de la perception collective et augmentée des véhicules autonomes connectés par les C-ITS." Electronic Thesis or Diss., Bordeaux, 2024. http://www.theses.fr/2024BORD0068.

Full text
Abstract:
Les Systèmes de Transport Intelligents Coopératifs (C-ITS) représentent une approche avancée dans le transport moderne. Ces systèmes exploitent les technologies de communication, telles que ETSI ITS-G5 et Cellular Vehicle-to-Everything (C-V2X), pour améliorer la sécurité routière et le flux de trafic. Au cœur des C-ITS se trouve le concept de perception coopérative, une caractéristique transformatrice qui permet aux Véhicules Coopératifs et Autonomes (CAVs) et aux unités d'infrastructure routière de partager et d'analyser collectivement les données de divers capteurs, y compris les caméras, le
APA, Harvard, Vancouver, ISO, and other styles
4

Smith, Shirley Denise. "Strategies to Reduce the Fiscal Impact of Cyberattacks." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7510.

Full text
Abstract:
A single cyberattack event involving 1 major corporation can cause severe business and social devastation. In this single case study, a major U.S. airline company was selected for exploration of the strategies information technology administrators and airline managers implemented to reduce the financial devastation that may be caused by a cyberattack. Seven participants, of whom 4 were airline managers and 3 were IT administrators, whose primary responsibility included implementation of strategies to plan for and respond to cyberattacks participated in the data collection process. This study w
APA, Harvard, Vancouver, ISO, and other styles
5

Hasan, Mahmudul. "Cybersecurity Planning Insight: CSCD (Cyber Security and Cyber Defense) Control: Framework For Strategic Direction and Governance." Master's thesis, 2021. http://hdl.handle.net/10362/126392.

Full text
Abstract:
Dissertation presented as the partial requirement for obtaining a Master's degree in Information Management, specialization in Information Systems and Technologies Management<br>In this recent time, the importance of cybersecurity and cyber defense is sky-high. Everyone uses different devices, IT infrastructures, and applications for various purposes at school, office, home, hospitals everywhere. With the enlightenment of technology, the nature of cyber-attack has been changed dramatically, and that is why the number of cyber-attacks have been increased. Enterprises face billions of Euros
APA, Harvard, Vancouver, ISO, and other styles
6

Silva, Ricardo Alexandre Marques. "A cibersegurança na política externa e de segurança da Estónia." Master's thesis, 2020. http://hdl.handle.net/10362/111191.

Full text
Abstract:
This thesis is focused on the role of Estonia's Foreign Policy in the field of cybersecurity. The concepts of cyberspace and cybersecurity are explored, detailing the main challenges that take place there, in order to better understand the threats faced by the advanced estonian digital society. It deals with the work of the main forums in which Estonia takes part, whose decisions and/or positions have a potential internal impact. In NATO and the EU, especially, this country finds a stage for its voices, drawing attention on the Russian geopolitical movements, which they see as hostile. The e
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Cybersecurity resilience"

1

Zaydi, Mounia, Yassine Maleh, Gabriel Chênevert, Hayat Zaydi, and Amina El Yaagoubi. Intelligent Cybersecurity and Resilience for Critical Industries: Challenges and Applications. River Publishers, 2025. https://doi.org/10.1201/9788770047746.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Trump, B. D., K. Hossain, and I. Linkov. Cybersecurity and Resilience in the Arctic. IOS Press, Incorporated, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Trump, B. D., K. Hossain, and I. Linkov. Cybersecurity and Resilience in the Arctic. IOS Press, Incorporated, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Trim, Peter R. J., and Yang-Im Lee, eds. Managing Cybersecurity Threats and Increasing Organizational Resilience. MDPI, 2023. http://dx.doi.org/10.3390/books978-3-0365-9645-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

International Monetary Fund. Monetary and Capital Markets Department. Belize: Technical Assistance Report--Cybersecurity, Regulation, Supervision, and Resilience. International Monetary Fund, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

International Monetary Fund. Monetary and Capital Markets Department. Belize: Technical Assistance Report--Cybersecurity, Regulation, Supervision, and Resilience. International Monetary Fund, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

International Monetary Fund. Monetary and Capital Markets Department. Belize: Technical Assistance Report--Cybersecurity, Regulation, Supervision, and Resilience. International Monetary Fund, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Christou, George. Cybersecurity in the European Union: Resilience and Adaptability in Governance Policy. Palgrave Macmillan, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Stochastic Programming in Supply Chain Risk Management: Resilience, Viability, and Cybersecurity. Springer, 2024.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Christou, George. Cybersecurity in the European Union: Resilience and Adaptability in Governance Policy. Palgrave Macmillan, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Cybersecurity resilience"

1

Singh, Tarnveer, and Sarah Y. Zheng. "Operational resilience." In The Psychology of Cybersecurity. Routledge, 2025. https://doi.org/10.4324/9781003610533-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Weis, Dan. "Understanding Cyber Risk and Cyber Resilience." In Boardroom Cybersecurity. Apress, 2024. http://dx.doi.org/10.1007/979-8-8688-0785-5_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Singh, Tarnveer. "Cybersecurity Tooling." In Digital Resilience, Cybersecurity and Supply Chains. Routledge, 2025. https://doi.org/10.4324/9781003604969-13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Alevizos, Lampis. "The Chess Game of Cybersecurity." In Cyber Resilience Index. Apress, 2025. https://doi.org/10.1007/979-8-8688-1122-7_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Singh, Tarnveer. "Digital Resilience." In Digital Resilience, Cybersecurity and Supply Chains. Routledge, 2025. https://doi.org/10.4324/9781003604969-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Singh, Tarnveer. "Workforce Resilience." In Digital Resilience, Cybersecurity and Supply Chains. Routledge, 2025. https://doi.org/10.4324/9781003604969-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Nosworthy, Beth. "Express Directors’ Duties for Cybersecurity: Resilience through Adaptation." In Digital Resilience. Springer Nature Singapore, 2025. https://doi.org/10.1007/978-981-97-9746-2_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Pasias, Achilleas, Thanasis Kotsiopoulos, George Lazaridis, Anastasis Drosou, Dimitrios Tzovaras, and Panagiotis Sarigiannidis. "Cyber-Resilience Enhancement Framework in Smart Grids." In Power Systems Cybersecurity. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-20360-2_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Shandilya, Shishir Kumar, Agni Datta, Yash Kartik, and Atulya Nagar. "Achieving Digital Resilience with Cybersecurity." In Digital Resilience: Navigating Disruption and Safeguarding Data Privacy. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-53290-0_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Singh, Tarnveer. "Building Supply Chain Resilience." In Digital Resilience, Cybersecurity and Supply Chains. Routledge, 2025. https://doi.org/10.4324/9781003604969-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cybersecurity resilience"

1

Kumar Jain, Yogesh, CA Dhaarna Singh Rathore, Anjani Johrawanshi, Manish Gupta, Deepak Kumar Choudhary, and Ankur Pandey. "Cybersecurity Frameworks: A Roadmap for Business Resilience." In 2024 International Conference on Cybernation and Computation (CYBERCOM). IEEE, 2024. https://doi.org/10.1109/cybercom63683.2024.10803234.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sargsyan, Gohar. "Cybersecurity as a Backbone for Sustainability." In 2024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2024. http://dx.doi.org/10.1109/csr61664.2024.10679426.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sachdeva, Priya, and Raman Kumar. "Navigating Ransomware Threats: Strengthing Cybersecurity Resilience in India." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10724571.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

François, Marin, Pierre-Emmanuel Arduin, and Myriam Merad. "Latent States: Model-Based Machine Learning Perspectives on Cyber Resilience." In 2024 4th Intelligent Cybersecurity Conference (ICSC). IEEE, 2024. https://doi.org/10.1109/icsc63108.2024.10894907.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rastogi, Aditya, Anubhav Agrawal, Ranbir Singh, and Ananya Aggarwal. "A Comprehensive Cybersecurity Resilience Framework Augmenting Smart Grid Stability." In 2024 IEEE 5th India Council International Subsections Conference (INDISCON). IEEE, 2024. http://dx.doi.org/10.1109/indiscon62179.2024.10744380.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Visky, Gabor, Aleksei Šiganov, Muaan ur Rehman, et al. "Hybrid Cybersecurity Research and Education Environment for Maritime Sector." In 2024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2024. http://dx.doi.org/10.1109/csr61664.2024.10679392.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cosic, Jasmin, Admir Jukan, and Miroslav Baca. "Strengthening Cybersecurity Certifications Through Robust Chain of Custody Practices." In 2024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2024. http://dx.doi.org/10.1109/csr61664.2024.10679449.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kumar, Biresh, Mayank Kumar, and Rahul Singh. "Elevating Urban Resilience: Cutting-Edge Cybersecurity Implementations for Smart Metropolises." In 2024 Parul International Conference on Engineering and Technology (PICET). IEEE, 2024. http://dx.doi.org/10.1109/picet60765.2024.10716157.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

de la Vergne de Cerval, Cyprien, Eric Perret, Jonathan Sarrazin, et al. "DIONYSUS - Deception Networks for the Cybersecurity of Physical Protection Systems." In 2024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2024. http://dx.doi.org/10.1109/csr61664.2024.10679489.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Perone, Stefano, Luca Faramondi, Simone Guarino, et al. "Cybersecurity for Safety: Risk Assessment of Autonomous Cyber-Physical Systems." In 2024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2024. http://dx.doi.org/10.1109/csr61664.2024.10679436.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Cybersecurity resilience"

1

Ingram, Michael, and Maurice Martin. Guide to Cybersecurity, Resilience, and Reliability for Small and Under-Resourced Utilities. Office of Scientific and Technical Information (OSTI), 2017. http://dx.doi.org/10.2172/1342373.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hariharan, Anand, and Masatake (Masa) Yamamichi. Basic Tool Kit for Cybersecurity in Education Management Information Systems. Asian Development Bank, 2024. http://dx.doi.org/10.22617/wps240301-2.

Full text
Abstract:
The increased reliance on online schooling modalities calls for provision of sufficient security in education management information systems (EMIS). Addressing cybersecurity-related issues is imperative for continuity of education service delivery and resilience of education systems. In case of any cybersecurity threat materializing, an EMIS must recover and be functional within an acceptable period and level of data loss. This tool kit provides guidance for decision-makers and practitioners on how to formulate strategies and implement cybersecurity measures in an EMIS, what cybersecurity issu
APA, Harvard, Vancouver, ISO, and other styles
3

Pasupuleti, Murali Krishna. Securing AI-driven Infrastructure: Advanced Cybersecurity Frameworks for Cloud and Edge Computing Environments. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv225.

Full text
Abstract:
Abstract: The rapid adoption of artificial intelligence (AI) in cloud and edge computing environments has transformed industries by enabling large-scale automation, real-time analytics, and intelligent decision-making. However, the increasing reliance on AI-powered infrastructures introduces significant cybersecurity challenges, including adversarial attacks, data privacy risks, and vulnerabilities in AI model supply chains. This research explores advanced cybersecurity frameworks tailored to protect AI-driven cloud and edge computing environments. It investigates AI-specific security threats,
APA, Harvard, Vancouver, ISO, and other styles
4

Boyens, Jon M. Cybersecurity Supply Chain Risk Management for Systems and Organizations. National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.sp.800-161r1.

Full text
Abstract:
Organizations are concerned about the risks associated with products and services that may contain potentially malicious functionality, are counterfeit, or are vulnerable due to poor manufacturing and development practices within the supply chain. These risks are associated with an enterprise’s decreased visibility into, and understanding of, how the technology they acquire is developed, integrated, and deployed, or the processes, procedures, standards, and practices used to ensure the security, resilience, reliability, safety, integrity, and quality of the products and services. This publicat
APA, Harvard, Vancouver, ISO, and other styles
5

Boehm, Mirko, Hilary Carter, and Cailean Osborne. Pathways to Cybersecurity Best Practices in Open Source: How the Civil Infrastructure Platform, Yocto Project, and Zephyr Project are Closing the Gap to Meeting the Requirements of the Cyber Resilience Act. The Linux Foundation, 2025. https://doi.org/10.70828/updc4713.

Full text
Abstract:
This case study report from the Linux Foundation investigates the impacts of the Cyber Resilience Act on open source software, including new cybersecurity obligations and the role of manufacturers and stewards. The analysis highlights the security practices of Linux Foundation projects and notes challenges like long-term support, regulatory uncertainty, and standardization gaps. The report recommends investing in security tools, fostering collaboration, and addressing emerging threats such as AI-driven risks. By featuring the cybersecurity practices of three LF projects—Yocto Project, Zephyr,
APA, Harvard, Vancouver, ISO, and other styles
6

Lawson, Adrienn, and Stephen Hendrick. Unaware and Uncertain: The Stark Realities of Cyber Resilience Act Readiness in Open Source. The Linux Foundation, 2025. https://doi.org/10.70828/twbs3885.

Full text
Abstract:
This survey-based report investigates the awareness and readiness of the open source community to comply with the EU's Cyber Resilience Act (CRA). The report reveals significant knowledge gaps in the open source ecosystem that must be addressed to adequately comply with the new regulation while maintaining sustainable open source development. The survey data shows that most respondents are unfamiliar with the CRA, are uncertain about compliance deadlines, and are unaware of non-compliance penalties. The recommendations developed from these findings include establishing a more active role for m
APA, Harvard, Vancouver, ISO, and other styles
7

Natarajan, Balasubramaniam, Behrooz Mirafzal, Hongyu Wu, Anil Pahwa, Rui Yang, and Govind Saraswat. Enabling Cybersecurity, Situational Awareness and Resilience in Distribution Grids with High Penetration of Photovoltaics (CARE-PV). Office of Scientific and Technical Information (OSTI), 2023. http://dx.doi.org/10.2172/2204692.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shirakawa, Nobuyuki. Digital Transformation in Asian Economies: Enhancing Productivity, Socioeconomic Impacts, and Policy Insights. Asian Productivity Organization, 2024. http://dx.doi.org/10.61145/lpmz4437.

Full text
Abstract:
The report explores the profound impact of Digital Transformation (DX) across twelve APO member countries. It delves into how DX, tailored to each nation's unique developmental stage and priorities, can drive inclusive growth, bridge the digital divide, and boost economic resilience. Featuring insights and strategic recommendations from experts led by Dr. Nobuyuki Shirakawa, it addresses challenges such as disparities and cybersecurity, advocating for robust infrastructure, digital literacy, and innovative ecosystems to harness DX for sustainable development and global economic integration.
APA, Harvard, Vancouver, ISO, and other styles
9

Su, Fei, Larisa Saveleva Dovgal, and Lora Saalman. Advancing the Role of the European Union in Promoting Global Cyber Stability. Stockholm International Peace Research Institute, 2023. http://dx.doi.org/10.55163/ttrc4774.

Full text
Abstract:
While the European Union as a collective entity continues to abstain from endorsing an offensive cyber posture, several of its member states have adopted both defensive and offensive activities and capabilities in cyberspace. In doing so, these member states mirror trends in China, Russia and the United States, which seem to possess increasingly similar strategies for balancing defensive and offensive cyber operations. Given this context, EU policy will need to navigate the potential involvement of its member states in offensive operations, while continuing to advocate for a defence-centric st
APA, Harvard, Vancouver, ISO, and other styles
10

Abassy, Malgorzata, and Weronika Krupa. Sino-Russo-Iranian Tech Cooperation as Threat for the EU: Systemic Approach. EuroHub4Sino, 2025. https://doi.org/10.31175/eh4s.3c7e.

Full text
Abstract:
The strategic convergence between Russia, Iran, and China poses a growing systemic threat to the European Union. Despite differing regional agendas, these three powers are increasingly aligned in key areas such as cybersecurity, military technology transfers, intelligence cooperation, and disinformation campaigns. Their coordinated efforts undermine the EU’s critical infrastructure, weaken its strategic autonomy, and erode trust in democratic institutions by targeting sectors such as energy, finance, healthcare, and electoral integrity. Although the EU has implemented sanctions and reinforced
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!