Journal articles on the topic 'Keywords: Cybersecurity'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Keywords: Cybersecurity.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Yılmaz, Vedat. "A Bibliometric Analysis on Cybersecurity Using VOSviewer: An Evaluation for Public Security." Balkan Journal of Electrical and Computer Engineering 13, no. 2 (2025): 210–18. https://doi.org/10.17694/bajece.1608364.
Full textPasupuleti, Murali Krishna. "Graph-Theoretical Intelligence for Adaptive Cybersecurity: Multi-Modal Models, Dynamic Defense, and Federated Threat Detection." International Journal of Academic and Industrial Research Innovations(IJAIRI) 05, no. 04 (2025): 347–56. https://doi.org/10.62311/nesx/rp3125.
Full textpavan G, Dr Swapna. "Social Media Cybersecurity: A Behavioural and Technological Perspective." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem48730.
Full textLAGE SERRANO, OSCAR, and MARIA SAIZ SANTOS. "BLOCKCHAIN AND THE DECENTRALISATION OF THE CYBERSECURITY INDUSTRY." DYNA 96, no. 3 (2021): 239. http://dx.doi.org/10.6036/10188.
Full textEfimova, Anna, and Artem Ivashchenko. "STUDY OF THE IMPACT OF DIGITAL TRANSFORMATION ON THE ECONOMIC ASPECTS OF CYBERSECURITY IN THE BUSINESS ENVIRONMENT." Actual Problems of Economics 1, no. 274 (2024): 163–74. http://dx.doi.org/10.32752/1993-6788-2024-1-274-163-174.
Full textKhan, Mohammed Mustafa. "CYBERSECURITY AWARENESS." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 10 (2024): 1–14. http://dx.doi.org/10.55041/ijsrem36233.
Full textP, Dr Rachana. "Strategic Approaches to Cybersecurity Audits for Control Evaluation." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–5. https://doi.org/10.55041/ijsrem40065.
Full textJumanah, Hasan AlSanad. "Cybersecurity In Education." International Journal of Computer Science and Information Technology Research 12, no. 2 (2024): 51–61. https://doi.org/10.5281/zenodo.12566761.
Full textDaliya1, Mohit Singh. "The Role of Cybersecurity in Blockchain." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem30686.
Full textFolorunsho, O. S., A. Q. Ayinde, M. A. Olagoke, and O. E. Fatoye. "Implementation of Cybersecurity Risk Theory and Model in Healthcare." Advances in Multidisciplinary and scientific Research Journal Publication 13, no. 4 (2022): 65–72. http://dx.doi.org/10.22624/aims/cisdi/v13n4p4.
Full textScholar Chinenye Obasi, Nko Okina Solomon, Olubunmi Adeolu Adenekan, and Peter Simpa. "Cybersecurity’s Role in Environmental Protection and Sustainable Development: Bridging Technology and Sustainability Goals." Computer Science & IT Research Journal 5, no. 5 (2024): 1145–77. http://dx.doi.org/10.51594/csitrj.v5i5.1140.
Full textGoel, Rajni, Anupam Kumar, and James Haddow. "PRISM: a strategic decision framework for cybersecurity risk assessment." Information & Computer Security 28, no. 4 (2020): 591–625. http://dx.doi.org/10.1108/ics-11-2018-0131.
Full textSharma, Monu. "Cybersecurity Platforms: Tackling Challenges in a Digital Age." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 11 (2024): 1–9. http://dx.doi.org/10.55041/ijsrem12257.
Full textSahinoglu, Mehmet, Alberto Arteta, and Engin Maşazade. "Editorial for the Special Issue (2024): Network and Information Security in Cyber Systems." International Journal of Computer Theory and Engineering 17, no. 2 (2024): 102–3. https://doi.org/10.7763/ijcte.2025.v17.1372.
Full textPanchamia, Virti, Archita Harchwani, and Tirath Momaya. "Cybersecurity Renaissance: Navigating Threats, Ethical Hacking, and Risk Mitigation in the Digital Era." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 01 (2024): 1–10. http://dx.doi.org/10.55041/ijsrem28181.
Full textNnenna, Ugwu Jovita, Ugwuanyi Ifeoma Perpetua, Asuma Mariita Nchaga, Tushabe Hadijah, Eric Mabonga, and Tom Ongesa Nyamboga. "Cybersecurity Measures in East African EGovernment Systems." IAA JOURNAL OF SOCIAL SCIENCES 10, no. 2 (2024): 12–24. http://dx.doi.org/10.59298/iaajss/2024/102.122400000.
Full textPersadha, Pratama. "Hacktivism Sebagai Upaya Menyampaikan Suara Lewat Ruang Siber Di Indonesia." JURNAL SOSIAL : Jurnal Penelitian Ilmu-Ilmu Sosial 21, no. 2 (2020): 72–77. http://dx.doi.org/10.33319/sos.v21i2.65.
Full textOlanrewaju Oluwaseun Ajayi, Chisom Elizabeth Alozie, and Olumese Anthony Abieba. "Innovative cybersecurity strategies for business intelligence: Transforming data protection and driving competitive superiority." Gulf Journal of Advance Business Research 3, no. 2 (2025): 527–36. https://doi.org/10.51594/gjabr.v3i2.95.
Full textTemitayo Oluwaseun Abrahams, Sarah Kuzankah Ewuga, Samuel Onimisi Dawodu, Abimbola Oluwatoyin Adegbite, and Azeez Olanipekun Hassan. "A REVIEW OF CYBERSECURITY STRATEGIES IN MODERN ORGANIZATIONS: EXAMINING THE EVOLUTION AND EFFECTIVENESS OF CYBERSECURITY MEASURES FOR DATA PROTECTION." Computer Science & IT Research Journal 5, no. 1 (2024): 1–25. http://dx.doi.org/10.51594/csitrj.v5i1.699.
Full textAnwuli Nkemchor Obiki-Osafiele, Edith Ebele Agu, and Njideka Rita Chiekezie. "Protecting digital assets in Fintech: Essential cybersecurity measures and best practices." Computer Science & IT Research Journal 5, no. 8 (2024): 1884–96. http://dx.doi.org/10.51594/csitrj.v5i8.1449.
Full textGomathy, Dr C. K., Dr V. Geetha, S. R. Bathrinathan, and Shiva Koushik Sripada. "EXPLORING THE ETHICAL CONSIDERATIONS OF BIOMETRICS IN CYBERSECURITY." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 09 (2024): 1–8. http://dx.doi.org/10.55041/ijsrem37507.
Full textSharma, Anush, Sujal Nangla, Anadya Kaushal, and Neha Soel. "Cybersecurity Types and Prevention Methods." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 09 (2024): 1–4. http://dx.doi.org/10.55041/ijsrem37573.
Full textOluwabunmi Layode, Henry Nwapali Ndidi Naiho, Gbenga Sheriff Adeleke, Ezekiel Onyekachukwu Udeh, and Talabi Temitope Labake. "The role of cybersecurity in facilitating sustainable healthcare solutions: Overcoming challenges to protect sensitive data." International Medical Science Research Journal 4, no. 6 (2024): 668–93. http://dx.doi.org/10.51594/imsrj.v4i6.1228.
Full textAdemola, ojo Emmanuel, and K. Somorin. "AI and Cybersecurity in Investigative Journalism: A Literature Review." Advances in Multidisciplinary & Scientific Research Journal Publications 10, no. 1 (2024): 9–16. http://dx.doi.org/10.22624/aims/sij/v10n1p3.
Full textAdemola, Ojo Emmanuel, and K. Somorin. "AI and Cybersecurity in Investigative Journalism: A Literature Review." Advances in Multidisciplinary & Scientific Research Journal Publications 10, no. 1 (2024): 9–18. http://dx.doi.org/10.22624/aims/sij/v10n1p2.
Full textAVCI, Halil Ersin. "Evaluation of Social Studies Teacher Candidates' Perspectives on Cybersecurity: The Case of Çanakkale Onsekiz Mart University." International Journal of Social Sciences 9, no. 37 (2025): 539–62. https://doi.org/10.52096/usbd.9.37.26.
Full textDarlington Eze Ekechukwu and Peter Simpa. "The future of Cybersecurity in renewable energy systems: A review, identifying challenges and proposing strategic solutions." Computer Science & IT Research Journal 5, no. 6 (2024): 1265–99. http://dx.doi.org/10.51594/csitrj.v5i6.1197.
Full textEnyinaya Stefano Okafor, Olatunji Akinrinola, Favour Oluwadamilare Usman, Olukunle Oladipupo Amoo, and Nneka Adaobi Ochuba. "CYBERSECURITY ANALYTICS IN PROTECTING SATELLITE TELECOMMUNICATIONS NETWORKS: A CONCEPTUAL DEVELOPMENT OF CURRENT TRENDS, CHALLENGES, AND STRATEGIC RESPONSES." International Journal of Applied Research in Social Sciences 6, no. 3 (2024): 254–66. http://dx.doi.org/10.51594/ijarss.v6i3.854.
Full textDarlington Eze Ekechukwu and Peter Simpa. "The importance of cybersecurity in protecting renewable energy investment: A strategic analysis of threats and solutions." Engineering Science & Technology Journal 5, no. 6 (2024): 1845–83. http://dx.doi.org/10.51594/estj.v5i6.1186.
Full textHenry Nwapali Ndidi Naiho, Oluwabunmi Layode, Gbenga Sheriff Adeleke, Ezekiel Onyekachukwu Udeh, and Talabi Temitope Labake. "Addressing cybersecurity challenges in smart grid technologies: Implications for sustainable energy infrastructure." Engineering Science & Technology Journal 5, no. 6 (2024): 1995–2015. http://dx.doi.org/10.51594/estj.v5i6.1218.
Full textPasunuru, Sreekanth. "Cybersecurity in Autonomous Systems: Protecting AI-Driven Applications." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 01 (2025): 1–7. https://doi.org/10.55041/ijsrem20376.
Full textFatai Adeshina Adelani, Enyinaya Stefano Okafor, Boma Sonimiteim Jacks, and Olakunle Abayomi Ajala. "THEORETICAL FRAMEWORKS FOR THE ROLE OF AI AND MACHINE LEARNING IN WATER CYBERSECURITY: INSIGHTS FROM AFRICAN AND U.S. APPLICATIONS." Computer Science & IT Research Journal 5, no. 3 (2024): 681–92. http://dx.doi.org/10.51594/csitrj.v5i3.928.
Full textAlbalas, Talal, Amir Modjtahedi, and Reza Abdi. "Cybersecurity governance: A scoping review." International Journal of Professional Business Review 7, no. 4 (2022): e0629. http://dx.doi.org/10.26668/businessreview/2022.v7i4.e629.
Full textEl-Toby, Bushra Hassan Mohamed, Waad Hadi Abd, and Akeel Dakheel Kareem. "Activating the role of judicial oversight in Iraq to reduce the phenomenon of tax evasion Field research in the Federal Office of Financial Supervision." International Journal of Professional Business Review 7, no. 5 (2022): e0765. http://dx.doi.org/10.26668/businessreview/2022.v7i5.e765.
Full textJelcy, M., K. Karthick, and S. Logeshwaran. "CYBER SECURITY." International Scientific Journal of Engineering and Management 04, no. 03 (2025): 1–7. https://doi.org/10.55041/isjem02350.
Full textMuthukrishnan, Muthusubramanian, Ahamed Mohamed Ikram, and Pakalapati Naveen. "Machine Learning for Cybersecurity Threat Detection and Prevention." International Journal of Innovative Science and Research Technology (IJISRT) 9, no. 2 (2024): 7. https://doi.org/10.5281/zenodo.10776751.
Full textHenry Nwapali Ndidi Naiho, Oluwabunmi Layode, Gbenga Sheriff Adeleke, Ezekiel Onyekachukwu Udeh, and Talabi Temitope Labake. "Cybersecurity considerations in the implementation of innovative waste management technologies: "A critical review"." Computer Science & IT Research Journal 5, no. 6 (2024): 1408–33. http://dx.doi.org/10.51594/csitrj.v5i6.1225.
Full textSungwook Ryu, Sungwook Ryu, Jinsu Kim Sungwook Ryu, and Namje Park Jinsu Kim. "Study on Trends and Predictions of Convergence in Cybersecurity Technology Using Machine Learning." 網際網路技術學刊 24, no. 3 (2023): 709–25. http://dx.doi.org/10.53106/160792642023052403016.
Full textOladapo Adeboye Popoola, Michael Oladipo Akinsanya, Godwin Nzeako, Excel G Chukwurah, and Chukwuekem David Okeke. "Exploring theoretical constructs of cybersecurity awareness and training programs: comparative analysis of African and U.S. Initiatives." International Journal of Applied Research in Social Sciences 6, no. 5 (2024): 819–27. http://dx.doi.org/10.51594/ijarss.v6i5.1104.
Full textSusanto, Susanto, and Gatot Soepriyanto. "Cybersecurity disclosure and audit fees: An empirical study of listed companies on the Indonesia stock exchange." Edelweiss Applied Science and Technology 8, no. 6 (2024): 6090–104. http://dx.doi.org/10.55214/25768484.v8i6.3328.
Full textSontan Adewale Daniel and Samuel Segun Victor. "EMERGING TRENDS IN CYBERSECURITY FOR CRITICAL INFRASTRUCTURE PROTECTION: A COMPREHENSIVE REVIEW." Computer Science & IT Research Journal 5, no. 3 (2024): 576–93. http://dx.doi.org/10.51594/csitrj.v5i3.872.
Full textNwankwo Charles Uzondu and Dominic Dummene Lele. "Challenges and strategies in securing smart environmental applications: A comprehensive review of cybersecurity measures." Computer Science & IT Research Journal 5, no. 7 (2024): 1695–720. http://dx.doi.org/10.51594/csitrj.v5i7.1353.
Full textAshish, S. S. "Model Context Protocol: A Context-Aware Framework for Enhancing Cybersecurity in Dynamic Environments." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem49289.
Full textJohara, Abdulrahman Al Jarri. "The Future of Cybersecurity Training." International Journal of Novel Research in Computer Science and Software Engineering 9, no. 2 (2022): 27. https://doi.org/10.5281/zenodo.6638368.
Full textSamuel Olaoluwa Folorunsho, Olubunmi Adeolu Adenekan, Chinedu Ezeigweneme, Ike Chidiebere Somadina, and Patrick Azuka Okeleke. "Ensuring Cybersecurity in telecommunications: Strategies to protect digital infrastructure and sensitive data." Computer Science & IT Research Journal 5, no. 8 (2024): 1855–83. http://dx.doi.org/10.51594/csitrj.v5i8.1448.
Full textPawlik, Marek. "Cybersecurity Guidelines for the Employees of the Railway Entities." Problemy Kolejnictwa - Railway Reports 65, no. 191 (2021): 95–102. http://dx.doi.org/10.36137/1915e.
Full textTari Yvonne Elete. "Impact of ransomware on industrial control systems in the oil and gas sector: Security challenges and strategic mitigations." Computer Science & IT Research Journal 5, no. 12 (2024): 2664–81. https://doi.org/10.51594/csitrj.v5i12.1759.
Full textElwaaey, Hossameldin Ali, and Ahmed Ibrahim Yousef. "Cybersecurity Aspects in Gamification: A Comprehensive Overview." International Journal Of Modern Engineering Research (IJMER) 14, no. 5 (2024): 79–87. https://doi.org/10.5281/zenodo.14048861.
Full textLawrence Damilare Oyeniyi, Chinonye Esther Ugochukwu, and Noluthando Zamanjomane Mhlongo. "DEVELOPING CYBERSECURITY FRAMEWORKS FOR FINANCIAL INSTITUTIONS: A COMPREHENSIVE REVIEW AND BEST PRACTICES." Computer Science & IT Research Journal 5, no. 4 (2024): 903–25. http://dx.doi.org/10.51594/csitrj.v5i4.1049.
Full textBabajide Tolulope Familoni and Philip Olaseni Shoetan. "CYBERSECURITY IN THE FINANCIAL SECTOR: A COMPARATIVE ANALYSIS OF THE USA AND NIGERIA." Computer Science & IT Research Journal 5, no. 4 (2024): 850–77. http://dx.doi.org/10.51594/csitrj.v5i4.1046.
Full text