Journal articles on the topic 'ENISA'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'ENISA.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Štitilis, Darius, Irmantas Rotomskis, Marius Laurinaitis, Sergiy Nadvynychnyy, and Nadiya Khorunzhak. "National cyber security strategies: management, unification and assessment." Independent Journal of Management & Production 11, no. 9 (2020): 2341. http://dx.doi.org/10.14807/ijmp.v11i9.1431.
Full textMcKenna, Brian. "ENISA set to join Internet governance debate." Computer Fraud & Security 2004, no. 10 (2004): 1. http://dx.doi.org/10.1016/s1361-3723(04)00115-0.
Full textAditya Putra, Fandi. "Pembentukan Ekosistem Local Government Information Sharing and Analysis Center (LocalGov-ISAC) dengan Toolkit ENISA ISAC in a Box pada Sektor Pemerintah Daerah Indonesia." Info Kripto 16, no. 3 (2022): 95–102. http://dx.doi.org/10.56706/ik.v16i3.58.
Full textPaskauskas, R. Andrew. "ENISA: 5G design and architecture of global mobile networks; threats, risks, vulnerabilities; cybersecurity considerations." Open Research Europe 2 (November 22, 2022): 125. http://dx.doi.org/10.12688/openreseurope.15219.1.
Full textPaskauskas, R. Andrew. "ENISA: 5G design and architecture of global mobile networks; threats, risks, vulnerabilities; cybersecurity considerations." Open Research Europe 2 (March 29, 2023): 125. http://dx.doi.org/10.12688/openreseurope.15219.2.
Full textPaskauskas, R. Andrew. "ENISA: 5G design and architecture of global mobile networks; threats, risks, vulnerabilities; cybersecurity considerations." Open Research Europe 2 (May 24, 2023): 125. http://dx.doi.org/10.12688/openreseurope.15219.3.
Full textOmeragic, Jasmin, Teufik Goletic, Adis Softic, et al. "First detection of Echinococcus multilocularis in Bosnia and Herzegovina." International Journal for Parasitology: Parasites and Wildlife 19 (December 31, 2022): 269–72. https://doi.org/10.1016/j.ijppaw.2022.11.005.
Full textGarcía Garrido, Sebastián. "Diseño Grandes Éxitos: Los hits de venta del diseño." i+Diseño. Revista Científico-Académica Internacional de Innovación, Investigación y Desarrollo en Diseño 4 (January 9, 2011): 96–107. http://dx.doi.org/10.24310/idiseno.2011.v4i.12667.
Full textSamonek, Aleksandra. "What Is the Future of European Cyber Security? Three Principles of European Cooperation and the Hybrid Joint Strategy of Cyber Defence." Studia Europejskie - Studies in European Affairs 24, no. 2 (2020): 43–60. http://dx.doi.org/10.33067/se.2.2020.3.
Full textPeliukh, O. I., M. V. Yesina, and D. Yu Holubnychyi. "CERT-UA assessment based on the CSIRT ENISA Maturity Model." Radiotekhnika, no. 213 (June 16, 2023): 41–48. http://dx.doi.org/10.30837/rt.2023.2.213.04.
Full textLiu, Chiang Lung, Wei Hsiu Chen, and Der Kuo Tung. "Identification of Critical Security Issues for Cloud Computing." Applied Mechanics and Materials 145 (December 2011): 272–76. http://dx.doi.org/10.4028/www.scientific.net/amm.145.272.
Full textWellerdt, Alexander. "Entwicklung eines europäischen Agentur(un)wesens im Energiebinnenmarkt? – Handeln der ACER auf Messers Schneide im Lichte der EuGH-Rechtsprechung." Europarecht 56, no. 3 (2021): 292–306. http://dx.doi.org/10.5771/0531-2485-2021-3-292.
Full textPopescu, Florin, George Bucăţa, and Sorin Pistol. "Quantum Internet and Security of Military Communications." Land Forces Academy Review 26, no. 4 (2021): 293–98. http://dx.doi.org/10.2478/raft-2021-0038.
Full textENNS-BRAY, William S., and Kim ROCHAT. "Medical Device Regulation and Cybersecurity: Achieving ‘Secure by Design’ for Regulatory Compliance." International Journal of Information Security and Cybercrime 9, no. 2 (2020): 12–17. http://dx.doi.org/10.19107/ijisc.2020.02.02.
Full textАндрущак, І., В. Марценюк, I. Андрощук, В. Чудовець, and М. Потейчук. "CLOUD COMPUTING AND ANALYSIS FEATURES OF CLOUD INFORMATION SECURITY." КОМП’ЮТЕРНО-ІНТЕГРОВАНІ ТЕХНОЛОГІЇ: ОСВІТА, НАУКА, ВИРОБНИЦТВО, no. 37 (December 28, 2019): 5–9. http://dx.doi.org/10.36910/6775-2524-0560-2019-37-1.
Full textPispa, Arttu, and Kimmo Halunen. "Comprehensive Artificial Intelligence Vulnerability Taxonomy." European Conference on Cyber Warfare and Security 23, no. 1 (2024): 379–87. http://dx.doi.org/10.34190/eccws.23.1.2157.
Full textSerrano, Héctor, and Javier Esteban. "Sueños de un grifo. Diseño con alma de agua." i+Diseño. Revista Científico-Académica Internacional de Innovación, Investigación y Desarrollo en Diseño 7 (April 8, 2012): 101–4. http://dx.doi.org/10.24310/idiseno.2012.v7i.12631.
Full textZACHARIS, Alexandros, Eloise JABES, Ifigenia LELLA, and Evangelos REKLEITIS. "Cyber Awareness Exercises: Virtual vs On-site Participation & the Hybrid Approach." International Journal of Information Security and Cybercrime 10, no. 2 (2021): 31–36. http://dx.doi.org/10.19107/ijisc.2021.02.04.
Full textMartí Pellón, José. "Asimetría informativa y financiación de pymes: el papel de los préstamos participativos." ICE, Revista de Economía, no. 904 (September 3, 2018): 71–83. http://dx.doi.org/10.32796/ice.2018.904.6665.
Full textGarcia, Bruno. "Information and security in cyberspace: The influence of globalization on the intensification of risks and threats in the last decade." Ciências e Políticas Públicas / Public Sciences & Policies 7, no. 1 (2021): 213–31. http://dx.doi.org/10.33167/2184-0644.cpp2021.vviin1/pp.213-231.
Full textGarcia, Bruno. "Informação e Segurança no Ciberespaço: A influência da globalização na intensificação de riscos e ameaças na última década." Ciências e Políticas Públicas / Public Sciences & Policies 7, no. 1 (2021): 193–212. http://dx.doi.org/10.33167/2184-0644.cpp2021.vviin1/pp.193-212.
Full textWiewiórowski, Wojciech, and Juhan Lepassaar. "Pairing up Cybersecurity and Data Protection efforts: EDPS and ENISA sign Memorandum of Understanding." Datenschutz und Datensicherheit - DuD 47, no. 2 (2023): 68. http://dx.doi.org/10.1007/s11623-023-1718-8.
Full textGonçalves, Emanuel. "Comprehensive Analysis for Cybersecurity and Interoperability in Portuguese Healthcare Systems Under NIS2." ARIS2 - Advanced Research on Information Systems Security 5, no. 1 (2025): 38–56. https://doi.org/10.56394/aris2.v5i1.59.
Full textŠepec, Miha, and Maša Kočivnik. "Combatting Cyberwarfare Crimes in the European Union." European Integration Studies 20, no. 2 (2024): 409–32. https://doi.org/10.46941/2024.2.16.
Full textБедаев, А. И. "МЕЖДУНАРОДНАЯ ИНФОРМАЦИОННАЯ БЕЗОПАСНОСТЬ В РАБОЧЕЙ ПОВЕСТКЕ ЕВРОСОЮЗА: УГРОЗЫ, НАПРАВЛЕНИЯ РАБОТЫ И ПРОБЛЕМЫ". Caspium Securitatis Journal of Caspian Safety & Security 4, № 1 (2024): 11–22. https://doi.org/10.54398/2713-024x.2024.4.1.001.
Full textSzádeczky, Tamás. "Cybersecurity Authorities and Related Policies in the EU and Hungary." Central and Eastern European eDem and eGov Days 331 (July 12, 2018): 287–99. http://dx.doi.org/10.24989/ocg.v331.24.
Full textSmith, Robert. "Reviewer Acknowledgements." Journal of Education and Training Studies 4, no. 3 (2016): 235. http://dx.doi.org/10.11114/jets.v4i3.1425.
Full textThanvi, Irfan Ali. "Legal Challenges in Securing Critical Information Infrastructure Protection (CIIP): An American Empathy." Cyber Law Reporter 02, no. 01 (2023): 60–86. http://dx.doi.org/10.55662/cylr.2023.2101.
Full textDI FRANCO, Fabio, Konstantinos PAPADATOS, and Konstantinos RANTOS. "Re-Visiting Cyber Security Training in the COVID-19 Era." International Journal of Information Security and Cybercrime 10, no. 2 (2021): 16–20. http://dx.doi.org/10.19107/ijisc.2021.02.02.
Full textSingh, Jitendra, and Kamlesh Kumar Raghuvanshi. "Regulations and Standards in Public Cloud." Journal of Information Technology Research 13, no. 3 (2020): 21–36. http://dx.doi.org/10.4018/jitr.2020070102.
Full textSmith, Robert. "Reviewer Acknowledgements." Journal of Education and Training Studies 4, no. 5 (2016): 262. http://dx.doi.org/10.11114/jets.v4i5.1582.
Full textSmith, Robert. "Reviewer Acknowledgements." Journal of Education and Training Studies 4, no. 6 (2016): 241. http://dx.doi.org/10.11114/jets.v4i6.1645.
Full textRohith, Vallabhaneni, and Veeramachaneni Vinod. "Threat Modeling for Enhanced Security in the Healthcare Industry with a Focus on Mobile Health and IoT." Engineering and Technology Journal 9, no. 10 (2024): 5329–31. https://doi.org/10.5281/zenodo.13923134.
Full textBamigbade, Oluwatobi. "Assessment of Cost-Benefit Dynamics of Cybersecurity Compliance Investments: A Multi-Sectoral Analysis Across Financial, Energy and Intelligence Industries." Journal of Energy Research and Reviews 17, no. 7 (2025): 86–105. https://doi.org/10.9734/jenrr/2025/v17i7435.
Full textAditya Putra, Fandi, and Farouq Aferudin. "Pengembangan Financial Service Information Sharing and Analysis Center (FS-ISAC) di Indonesia dengan Pendekatan ENISA ISAC in a Box." Info Kripto 16, no. 2 (2022): 79–86. http://dx.doi.org/10.56706/ik.v16i2.49.
Full textCruz, Cayetano, and Jesús Ángel Prieto. "Diseñando con las manos: proyecto y proceso en la artesanía del s. XXI." i+Diseño. Revista Científico-Académica Internacional de Innovación, Investigación y Desarrollo en Diseño 5 (April 7, 2011): 138–40. http://dx.doi.org/10.24310/idiseno.2011.v5i.12652.
Full textAnanda, Safrida, Ika Putranti, and Andi Dir. "ANALYSIS OF THE EU CYBERSECURITY ACT UNDER THE THEORY OF NEOLIBERAL INSTITUTIONALISM." Arena Hukum 15, no. 1 (2022): 176–99. http://dx.doi.org/10.21776/ub.arenahukum.2022.01501.9.
Full textMeily, Meily. "XYZ Web App Information Security Management Risk Assessment." ACMIT Proceedings 1, no. 1 (2014): 59–89. http://dx.doi.org/10.33555/acmit.v1i1.19.
Full textSmith, Robert. "Reviewer Acknowledgements." Journal of Education and Training Studies 4, no. 4 (2016): 295. http://dx.doi.org/10.11114/jets.v4i4.1484.
Full textСавчук, Сергій Олександрович. "Виклики та можливості інтеграції України в систему кібербезпеки ЄС". Економіка, управління та адміністрування, № 2(108) (1 серпня 2024): 198–203. https://doi.org/10.26642/ema-2024-2(108)-198-203.
Full textDe Barros, Martina. "Cybersecurity in Mozambique: Status and Challenges." European Conference on Cyber Warfare and Security 22, no. 1 (2023): 553–58. http://dx.doi.org/10.34190/eccws.22.1.1194.
Full textGRAMMATOPOULOS, Athanasios Vasileios, and Fabio DI FRANCO. "Building a Career Path Through Training Programmes Using ECSF." International Journal of Information Security and Cybercrime 12, no. 1 (2023): 11–17. http://dx.doi.org/10.19107/ijisc.2023.01.01.
Full textMartinez, Cristina, Iñaki Etxaniz, Alberto Molinuevo, and Juncal Alonso. "MEDINA Catalogue of Cloud Security controls and metrics: Towards Continuous Cloud Security compliance." Open Research Europe 4 (April 24, 2024): 90. http://dx.doi.org/10.12688/openreseurope.16669.1.
Full textИманбаев, Азамат, Сахыбай Тынымбаев, Роман Одарченко та Ерсултан Валихан. "АНАЛИЗ МЕХАНИЗМОВ БЕЗОПАСНОСТИ СЕТЕЙ СОТОВОЙ СВЯЗИ 5G". Вестник Алматинского университета энергетики и связи 1, № 64 (2024): 69–85. http://dx.doi.org/10.51775/2790-0886_2024_64_1_69.
Full textGherghin, Claudia-Anamaria. "Public Policies in Data Security in the European Union: A Literature Review." TechHub Journal 3 (December 10, 2024): 74–80. https://doi.org/10.47577/techhub.v3i.128.
Full textMackita, Masky, Soo-Young Shin, and Tae-Young Choe. "ERMOCTAVE: A Risk Management Framework for IT Systems Which Adopt Cloud Computing." Future Internet 11, no. 9 (2019): 195. http://dx.doi.org/10.3390/fi11090195.
Full textČelik, Petar. "Institutional Measures for Increasing the Cyber Security for Business in the European Union." Economic Themes 57, no. 3 (2019): 351–64. http://dx.doi.org/10.2478/ethemes-2019-0020.
Full textSmith, Robert. "Reviewer Acknowledgements." Journal of Education and Training Studies 3, no. 6 (2015): 298. http://dx.doi.org/10.11114/jets.v3i6.1178.
Full textSmith, Robert. "Reviewer Acknowledgements." Journal of Education and Training Studies 4, no. 1 (2015): 238. http://dx.doi.org/10.11114/jets.v4i1.1238.
Full textSmith, Robert. "Reviewer Acknowledgements." Journal of Education and Training Studies 4, no. 2 (2016): 198. http://dx.doi.org/10.11114/jets.v4i2.1291.
Full text