Journal articles on the topic 'Cybersecurity'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cybersecurity.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Whyte, Jeffrey. "Cybersecurity, race, and the politics of truth." Security Dialogue 53, no. 4 (2022): 342–62. http://dx.doi.org/10.1177/09670106221101725.
Full textJohri, Amar, and Shailendra Kumar. "Exploring Customer Awareness towards Their Cyber Security in the Kingdom of Saudi Arabia: A Study in the Era of Banking Digital Transformation." Human Behavior and Emerging Technologies 2023 (January 12, 2023): 1–10. http://dx.doi.org/10.1155/2023/2103442.
Full textMaurer, Chris, Kevin Kim, Dan Kim, and Leon A. Kappelman. "Cybersecurity." Communications of the ACM 64, no. 2 (2021): 28–30. http://dx.doi.org/10.1145/3399667.
Full textRatnayake, Deepthi. "Cybersecurity." ITNOW 64, no. 2 (2022): 49. http://dx.doi.org/10.1093/itnow/bwac056.
Full textRatnayake, Deepthi. "Cybersecurity." ITNOW 64, no. 1 (2022): 37. http://dx.doi.org/10.1093/itnow/bwac019.
Full textPullin, Dennis W. "Cybersecurity." Frontiers of Health Services Management 35, no. 1 (2018): 3–12. http://dx.doi.org/10.1097/hap.0000000000000038.
Full textCACM Staff. "Cybersecurity." Communications of the ACM 60, no. 4 (2017): 20–21. http://dx.doi.org/10.1145/3051455.
Full textCampbell, Robert D. "Cybersecurity." ACM SIGCSE Bulletin 35, no. 2 (2003): 24–26. http://dx.doi.org/10.1145/782941.782965.
Full textBOHATY, ROCHELLE F. H. "CYBERSECURITY." Chemical & Engineering News 86, no. 44 (2008): 18–20. http://dx.doi.org/10.1021/cen-v086n044.p018.
Full textRatnayake, Deepthi. "Cybersecurity." ITNOW 64, no. 4 (2022): 39. http://dx.doi.org/10.1093/combul/bwac124.
Full textAl Ali, Naser Abdel Raheem, Anna A. Chebotareva, and Vladimir E. Chebotarev. "Cyber security in marine transport." Pomorstvo 35, no. 2 (2021): 248–55. http://dx.doi.org/10.31217/p.35.2.7.
Full textDubov, D., and S. Dubova. "A GLOBAL SHORTFALL OF CYBER WORKFORCE: EVALUATING THE U.S. STRATEGY APPROACH AND UKRAINE'S EMERGING CHALLENGES." Actual Problems of International Relations, no. 162 (2025): 55–62. https://doi.org/10.17721/apmv.2025.162.1.55-62.
Full textStudent, Speaker: Isaik Agudelo Watstein, and Advisor: Leon Guillermo Marin Ortega Faculty. "CYBERSECURITY WITH A SOCIAL VISION PROTECTING RIGHTS IN THE DIGITAL AGE." International Journal of Engineering Technology Research & Management (IJETRM) 09, no. 05 (2025): 302–9. https://doi.org/10.5281/zenodo.15468798.
Full textpavan G, Dr Swapna. "Social Media Cybersecurity: A Behavioural and Technological Perspective." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem48730.
Full textTsvilii, Olena. "Cybersecurity regulation: cybersecurity certification of operational technologies." Technology audit and production reserves 1, no. 2(57) (2021): 54–60. http://dx.doi.org/10.15587/2706-5448.2021.225271.
Full textOlena, Tsvilii. "Cybersecurity regulation: cybersecurity certification of operational technologies." Technology audit and production reserves 1, no. 2(57) (2021): 54–60. https://doi.org/10.15587/2706-5448.2021.225271.
Full textAgrawal, Garima, Kuntal Pal, Yuli Deng, Huan Liu, and Ying-Chih Chen. "CyberQ: Generating Questions and Answers for Cybersecurity Education Using Knowledge Graph-Augmented LLMs." Proceedings of the AAAI Conference on Artificial Intelligence 38, no. 21 (2024): 23164–72. http://dx.doi.org/10.1609/aaai.v38i21.30362.
Full textMwansa, Gardner, Ricky Ngandu, and Onke Khala. "Cyberbullying Prevalence at a Rural Based University in the Eastern Cape, South Africa." International Journal of Social Science Research and Review 6, no. 12 (2023): 361–86. http://dx.doi.org/10.47814/ijssrr.v7i1.1783.
Full textUlven, Joachim Bjørge, and Gaute Wangen. "A Systematic Review of Cybersecurity Risks in Higher Education." Future Internet 13, no. 2 (2021): 39. http://dx.doi.org/10.3390/fi13020039.
Full textMorales-Sáenz, Francisco Isaí, José Melchor Medina-Quintero, and Miguel Reyna-Castillo. "Beyond Data Protection: Exploring the Convergence between Cybersecurity and Sustainable Development in Business." Sustainability 16, no. 14 (2024): 5884. http://dx.doi.org/10.3390/su16145884.
Full textRana, Prateek. "Role of Machine Learning in Cybersecurity: Techniques and Challenges." International Journal for Research in Applied Science and Engineering Technology 12, no. 1 (2024): 44–48. http://dx.doi.org/10.22214/ijraset.2023.57786.
Full textRana, Prateek. "Role of Machine Learning in Cybersecurity: Techniques and Challenges." International Journal for Research in Applied Science and Engineering Technology 12, no. 1 (2024): 44–48. http://dx.doi.org/10.22214/ijraset.2024.57786.
Full textPOPESCU, Eugen F. "Complementary Cybersecurity." International Journal of Information Security and Cybercrime 9, no. 2 (2020): 33–37. http://dx.doi.org/10.19107/ijisc.2020.02.05.
Full textOleinik, Margarita, and Tatyana Porubel. "Agroholdings cybersecurity." Proceedings of the Kuban State Agrarian University 1, no. 78 (2019): 33–41. http://dx.doi.org/10.21515/1999-1703-78-33-41.
Full textVoas, Jeffrey. "Crying “Cybersecurity!”." Computer 55, no. 10 (2022): 14–15. http://dx.doi.org/10.1109/mc.2022.3178862.
Full textRatnayake, Deepthi. "Insight: Cybersecurity." ITNOW 63, no. 2 (2021): 41. http://dx.doi.org/10.1093/itnow/bwab052.
Full textRatnayake, Deepthi. "Insight: Cybersecurity." ITNOW 63, no. 3 (2021): 39. http://dx.doi.org/10.1093/itnow/bwab082.
Full textGritzalis, Dimitris A., Grammati Pantziou, and Rodrigo Román-Castro. "Sensors Cybersecurity." Sensors 21, no. 5 (2021): 1762. http://dx.doi.org/10.3390/s21051762.
Full textRatnayake, Deepthi. "Insight: cybersecurity." ITNOW 63, no. 4 (2021): 39. http://dx.doi.org/10.1093/itnow/bwab118.
Full textMaconachy, W. V., and D. Kinsey. "Cybersecurity Education." Journal of The Colloquium for Information Systems Security Education 9, no. 1 (2022): 4. http://dx.doi.org/10.53735/cisse.v9i1.138.
Full textCraigen, Dan, Nadia Diakun-Thibault, and Randy Purse. "Defining Cybersecurity." Technology Innovation Management Review 4, no. 10 (2014): 13–21. http://dx.doi.org/10.22215/timreview/835.
Full textCraigen, Dan, Nadia Diakun-Thibault, and Randy Purse. "Defining Cybersecurity." Technology Innovation Management Review 4, no. 10 (2014): 13–21. http://dx.doi.org/10.22215/timreview835.
Full textBaranchuk, Adrian, Bryce Alexander, Debra Campbell, et al. "Pacemaker Cybersecurity." Circulation 138, no. 12 (2018): 1272–73. http://dx.doi.org/10.1161/circulationaha.118.035261.
Full textReagin, Michael J., and Michael V. Gentry. "Enterprise Cybersecurity." Frontiers of Health Services Management 35, no. 1 (2018): 13–22. http://dx.doi.org/10.1097/hap.0000000000000037.
Full textWadia, Reena. "Cybersecurity threats." British Dental Journal 237, no. 10 (2024): 793. http://dx.doi.org/10.1038/s41415-024-8121-1.
Full textKhan, Mohammed Mustafa. "CYBERSECURITY AWARENESS." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 10 (2024): 1–14. http://dx.doi.org/10.55041/ijsrem36233.
Full textNesterov, E. A., and V. Ya Tsvetkov. "Transport Cybersecurity." World of Transport and Transportation 21, no. 6 (2024): 103–9. http://dx.doi.org/10.30932/1992-3252-2023-21-6-12.
Full textRadziwill, Nicole M. "Cybersecurity Leadership." Quality Management Journal 25, no. 2 (2018): 109. http://dx.doi.org/10.1080/10686967.2018.1436356.
Full textKim, Lee. "Cybersecurity awareness." Nursing 47, no. 6 (2017): 65–67. http://dx.doi.org/10.1097/01.nurse.0000516242.05454.b4.
Full textTalbot, Edward B., Deborah Frincke, and Matt Bishop. "Demythifying Cybersecurity." IEEE Security & Privacy Magazine 8, no. 3 (2010): 56–59. http://dx.doi.org/10.1109/msp.2010.95.
Full textLukowiak, Marcin, Stanisław Radziszowski, James Vallino, and Christopher Wood. "Cybersecurity Education." ACM Transactions on Computing Education 14, no. 1 (2014): 1–20. http://dx.doi.org/10.1145/2538029.
Full textKim, Lee. "Cybersecurity awareness." Nursing Management (Springhouse) 48, no. 4 (2017): 16–19. http://dx.doi.org/10.1097/01.numa.0000514066.30572.f3.
Full textKim, Lee. "Cybersecurity matters." Nursing Management (Springhouse) 49, no. 2 (2018): 16–22. http://dx.doi.org/10.1097/01.numa.0000529921.97762.be.
Full textKuhn, Rick. "Introduction: Cybersecurity." IT Professional 12, no. 4 (2010): 18–19. http://dx.doi.org/10.1109/mitp.2010.110.
Full textAlDaajeh, Saleh, and Saed Alrabaee. "Strategic cybersecurity." Computers & Security 141 (June 2024): 103845. http://dx.doi.org/10.1016/j.cose.2024.103845.
Full textSanjana, Gadalay. "Cybersecurity Assessments." International Journal of Recent Technology and Engineering (IJRTE) 9, no. 4 (2020): 330–32. https://doi.org/10.35940/ijrte.D5004.119420.
Full textRavikumar, Rangachary. "Strengthening Cybersecurity." Technical Notes and Manuals 2025, no. 006 (2025): 1. https://doi.org/10.5089/9798400296864.005.
Full textBurley, Diana L., Jon Eisenberg, and Seymour E. Goodman. "Would cybersecurity professionalization help address the cybersecurity crisis?" Communications of the ACM 57, no. 2 (2014): 24–27. http://dx.doi.org/10.1145/2556936.
Full textTewari, Shweta. "Cryptocurrency and Cybersecurity." International Journal of Scientific Engineering and Research 6, no. 1 (2018): 49. https://doi.org/10.70729/ijser172242.
Full textGołębiowska, Anna, and Dariusz Prokopowicz. "CYBER SECURITY AND OTHER DETERMINANTS OF THE INTERNETIZATION OF LOCAL AND MUNICIPAL MAGAZINES." Zeszyty Naukowe SGSP 87 (September 29, 2023): 219–46. http://dx.doi.org/10.5604/01.3001.0053.9119.
Full text