Academic literature on the topic 'Keywords: Cybersecurity'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Keywords: Cybersecurity.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Keywords: Cybersecurity"
Yılmaz, Vedat. "A Bibliometric Analysis on Cybersecurity Using VOSviewer: An Evaluation for Public Security." Balkan Journal of Electrical and Computer Engineering 13, no. 2 (2025): 210–18. https://doi.org/10.17694/bajece.1608364.
Full textPasupuleti, Murali Krishna. "Graph-Theoretical Intelligence for Adaptive Cybersecurity: Multi-Modal Models, Dynamic Defense, and Federated Threat Detection." International Journal of Academic and Industrial Research Innovations(IJAIRI) 05, no. 04 (2025): 347–56. https://doi.org/10.62311/nesx/rp3125.
Full textpavan G, Dr Swapna. "Social Media Cybersecurity: A Behavioural and Technological Perspective." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem48730.
Full textLAGE SERRANO, OSCAR, and MARIA SAIZ SANTOS. "BLOCKCHAIN AND THE DECENTRALISATION OF THE CYBERSECURITY INDUSTRY." DYNA 96, no. 3 (2021): 239. http://dx.doi.org/10.6036/10188.
Full textEfimova, Anna, and Artem Ivashchenko. "STUDY OF THE IMPACT OF DIGITAL TRANSFORMATION ON THE ECONOMIC ASPECTS OF CYBERSECURITY IN THE BUSINESS ENVIRONMENT." Actual Problems of Economics 1, no. 274 (2024): 163–74. http://dx.doi.org/10.32752/1993-6788-2024-1-274-163-174.
Full textKhan, Mohammed Mustafa. "CYBERSECURITY AWARENESS." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 10 (2024): 1–14. http://dx.doi.org/10.55041/ijsrem36233.
Full textP, Dr Rachana. "Strategic Approaches to Cybersecurity Audits for Control Evaluation." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–5. https://doi.org/10.55041/ijsrem40065.
Full textJumanah, Hasan AlSanad. "Cybersecurity In Education." International Journal of Computer Science and Information Technology Research 12, no. 2 (2024): 51–61. https://doi.org/10.5281/zenodo.12566761.
Full textDaliya1, Mohit Singh. "The Role of Cybersecurity in Blockchain." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem30686.
Full textFolorunsho, O. S., A. Q. Ayinde, M. A. Olagoke, and O. E. Fatoye. "Implementation of Cybersecurity Risk Theory and Model in Healthcare." Advances in Multidisciplinary and scientific Research Journal Publication 13, no. 4 (2022): 65–72. http://dx.doi.org/10.22624/aims/cisdi/v13n4p4.
Full textBooks on the topic "Keywords: Cybersecurity"
Elsa Philip, Chanjana, and Tharzana P. A. THE INTER-RELATIONSHIP BETWEEN E-COMMERCE AND RIGHT TO PRIVACY: AN ASSESSMENT. Magestic Technology Solutions (P) Ltd, Chennai, Tamil Nadu, India, 2023. http://dx.doi.org/10.47716/mts.b.978-93-92090-31-8.
Full textPalkova, Karina, Aleksandra Palkova, Vitālijs Rakstins, et al. Handbook for Academic and Scientific Institutions: Improve Risk Management and Institutional Resilience in the face of Security Threats. Rīga Stradiņš University, 2024. https://doi.org/10.25143/handbook_isbn-978-9934-618-61-1.
Full textBook chapters on the topic "Keywords: Cybersecurity"
Yin, Hui, Yu Zhang, Fangmin Li, and Keqin Li. "Attribute-Based Secure Keyword Search for Cloud Computing." In Cybersecurity and High-Performance Computing Environments. Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9781003155799-5.
Full textKashihara, Kazuaki, Harshdeep Singh Sandhu, and Jana Shakarian. "Automated Corpus Annotation for Cybersecurity Named Entity Recognition with Small Keyword Dictionary." In Lecture Notes in Networks and Systems. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-82199-9_11.
Full textPasupuleti, Murali Krishna. "Quantum Communication and Cybersecurity: Advancements in Cryptography and Secure Satellite Networks." In Quantum Communication and Cybersecurity. National Education Services, 2025. https://doi.org/10.62311/nesx/77548.
Full textKrishna Pasupuleti, Murali. "AI-Driven Cybersecurity: Safeguarding Enterprise Infrastructure and Digital Assets." In AI in Cybersecurity for Enterprises: Tools for Protecting Digital Assets and Infrastructure. National Education Services, 2024. http://dx.doi.org/10.62311/nesx/905735.
Full textDas, Ms Rishita, and Mr Rhythm Mukherjee. "INFORMATION TECHNOLOGY." In Futuristic Trends in Management Volume 3 Book 7. Iterative International Publisher, Selfypage Developers Pvt Ltd, 2024. http://dx.doi.org/10.58532/v3bhma7p1ch5.
Full textPasupuleti, Murali Krishna. "Legal and Regulatory Frameworks for AI in Cybersecurity: Strategies Against Threats and Fraud." In AI-Enabled Security: Defending the Digital Realm Against Cyber Threats and Fraud. National Education Services, 2024. http://dx.doi.org/10.62311/nesx/97890.
Full textPasupuleti, Murali Krishna. "Quantum Computing and the Future of Digital Security." In Quantum Computing: The Next Information Age. National Education Services, 2024. http://dx.doi.org/10.62311/nesx/97818.
Full textKrishna Pasupuleti, Murali. "IoT-Driven Transformation: Advancing Agriculture, Smart Cities, and Digital Security." In Smart IoT Solutions: Revolutionizing Agriculture, Urban Infrastructure, and Cybersecurity. National Education Services, 2024. https://doi.org/10.62311/nesx/46059.
Full textKrishna Pasupuleti, Murali. "Techno-Diplomacy and Global Power Shifts: The Strategic Role of Alliances in a Digital Age." In Global Superpower Dynamics: The Role of Technology and Diplomacy in Shaping Future Alliances. National Education Services, 2024. http://dx.doi.org/10.62311/nesx/66272.
Full textPasupuleti, Murali Krishna. "AI and IoT for the Smart Economy: Transforming Manufacturing and Service Industries." In AI and IoT in the Smart Economy: Revolutionizing Manufacturing and Services. National Education Services, 2025. https://doi.org/10.62311/nesx/68106.
Full textConference papers on the topic "Keywords: Cybersecurity"
Komosar, Aleksa, Dragana Slavic, Slavko Rakić, and Darko Stefanović. "MAPPING THE INTERSECTION OF CYBERSECURITY AND INDUSTRY 5.0: A BIBLIOMETRIC ANALYSIS." In INTERNATIONAL Conference on Business, Management, and Economics Engineering Future-BME. Faculty of Technical Sciences, Novi Sad, 2025. https://doi.org/10.24867/future-bme-2024-078.
Full textTalabi, A. A., O. B. Longe, A. A. Muhammad, and K. Olusanya. "Cybersecurity Risk Management in Identity Systems using Biometric-based Multimodal Authentication." In 28th iSTEAMS Multidisciplinary Research Conference AIUWA The Gambia. Society for Multidisciplinary and Advanced Research Techniques - Creative Research Publishers, 2021. http://dx.doi.org/10.22624/aims/isteams-2021/v28n2p5.
Full textBhuvaneshwari, A. J., and P. Kaythry. "Enhanced Lightweight Visual Cryptosystem (ELVC): Fortifying Cybersecurity for Visual Data Protection." In 3rd SLIIT International Conference on Engineering and Technology. SLIIT, 2024. http://dx.doi.org/10.54389/tddb1160.
Full textMathews, Anurag, and S. M Taiabul Haque. "Exploring the Risks of Password Reuse across Websites of Different Importance." In 12th International Conference on Human Interaction and Emerging Technologies (IHIET 2024). AHFE International, 2024. http://dx.doi.org/10.54941/ahfe1005468.
Full textBahmanova, Alona, and Natalja Lace. "From cyber security to cyber resilience: safeguarding against evolving risks in the digital landscape." In 14th International Scientific Conference „Business and Management 2024“. Vilnius Gediminas Technical University, 2024. http://dx.doi.org/10.3846/bm.2024.1317.
Full textTeh, Yit Loong, Yit Loong Tan, and Siaw Lang Wong. "5G Cybersecurity: Risk Assessment and Incident Response in the Healthcare Industry." In International Conference on Digital Transformation and Applications (ICDXA 2021). Tunku Abdul Rahman University College, 2021. http://dx.doi.org/10.56453/icdxa.2021.1015.
Full textDiallo, Ousmane, Hasnani Hassan, and Muslim Najeeb Zaidan. "Leveraging Naive Bayesian Machine Learning for Detecting Pig Butchering Scams: A Cybersecurity Social Engineering Perspective in Africa." In The 5th International Scientific Conference on Administrative and Financial Sciences (CIC-ISCAFS'2025). Cihan University-Erbil, 2025. https://doi.org/10.24086/icafs2025/paper.1746.
Full textGündoğar, Ali, and Saulius Niauronis. "Overview of Potential Risks of Artificial General Intelligence Robots." In Applied Scientific Research. Šiaulių valstybinė kolegija / Šiauliai State Higher Education Institution, 2023. http://dx.doi.org/10.56131/tmt.2023.2.1.93.
Full textIsaac Gabriel, Odun-Ayo. "A Review of Common Tools and Techniques for Reconnaissance Attacks.. Proceedings of the." In 28th iSTEAMS Multidisciplinary Research Conference AIUWA The Gambia. Society for Multidisciplinary and Advanced Research Techniques - Creative Research Publishers, 2021. http://dx.doi.org/10.22624/aims/isteams-2021/v28p11.
Full textOluoha, U. O., G. E. kereke, N. C. Udanor, and F. S. Bakpo. "A Deception Based Intelligent Intrusion Detection System for Detecting Threats of Exploits in Cloud Based Environments." In Advances in Multidisciplinary and Scientific Research Journal Publication. Society for Multidisciplinary and Advanced Research Techniques - Creative Research Publishers, 2021. http://dx.doi.org/10.22624/aims/isteams-2021/v28p2.
Full textReports on the topic "Keywords: Cybersecurity"
Pasupuleti, Murali Krishna. AI and Quantum-Nano Frontiers: Innovations in Health, Sustainability, Energy, and Security. National Education Services, 2025. https://doi.org/10.62311/nesx/rr525.
Full textPasupuleti, Murali Krishna. Securing AI-driven Infrastructure: Advanced Cybersecurity Frameworks for Cloud and Edge Computing Environments. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv225.
Full textPasupuleti, Murali Krishna. Scalable Quantum Networks: Entanglement-Driven Secure Communication. National Education Services, 2025. https://doi.org/10.62311/nesx/rrvi525.
Full textPasupuleti, Murali Krishna. Quantum Intelligence: Machine Learning Algorithms for Secure Quantum Networks. National Education Services, 2025. https://doi.org/10.62311/nesx/rr925.
Full textPasupuleti, Murali Krishna. Smart Nanomaterials and AI-Integrated Grids for Sustainable Renewable Energy. National Education Services, 2025. https://doi.org/10.62311/nesx/rr1025.
Full textPasupuleti, Murali Krishna. Next-Generation Extended Reality (XR): A Unified Framework for Integrating AR, VR, and AI-driven Immersive Technologies. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv325.
Full textPasupuleti, Murali Krishna. Quantum-Enhanced Machine Learning: Harnessing Quantum Computing for Next-Generation AI Systems. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv125.
Full text