Journal articles on the topic 'National Cyber Security Centre (NCSC)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'National Cyber Security Centre (NCSC).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Mackay, Matthew. "Cyber risk assessment in a post-IS1 world." ITNOW 63, no. 4 (2021): 52. http://dx.doi.org/10.1093/itnow/bwab124.
Full textFarisin, Mokhamad Saiful. "Menjaga Keamanan Digital Strategi serta Kebijakan Swiss dalam Mengatasi Ancaman Ransomware." Interdependence Journal of International Studies 6, no. 1 (2025): 69–80. https://doi.org/10.54144/ijis.v6i1.78.
Full textGonsales, Priscila, Susan Halford, and Dale Southerton. "Pesquisa em futuros sociodigitais: reivindicações e affordances em evidência." Linhas Críticas 30 (October 24, 2024): e54168. https://doi.org/10.26512/lc30202454168.
Full textIkuero, F. E. "Preliminary review of cybersecurity coordination in Nigeria." Nigerian Journal of Technology 41, no. 3 (2022): 521–26. http://dx.doi.org/10.4314/njt.v41i3.11.
Full textSudhip, S., I. Roshan Singha, and Mohammad Atif. "Indian Cyber Security and Defence: A Comprehensive Analysis." International Journal for Research in Applied Science and Engineering Technology 13, no. 3 (2025): 2544–47. https://doi.org/10.22214/ijraset.2025.67872.
Full textTurk, Žiga, Muammer Semih Sonkor, and Robert Klinc. "CYBERSECURITY ASSESSMENT OF BIM/CDE DESIGN ENVIRONMENT USING CYBER ASSESSMENT FRAMEWORK." JOURNAL OF CIVIL ENGINEERING AND MANAGEMENT 28, no. 5 (2022): 349–64. http://dx.doi.org/10.3846/jcem.2022.16682.
Full textUrbanovics, Anna, and Péter Sasvári. "Az Egyesült Királyságban működő kiberbiztonsági képzésekbe bevont oktatók tudományos teljesítményének elemzése." Információs Társadalom 18, no. 3-4 (2019): 105. http://dx.doi.org/10.22503/inftars.xviii.2018.3-4.5.
Full textUrbanovics, Anna, and Peter Sasvari. "Cyber Security Master's degrees in the United Kingdom: a comparative analysis." Central and Eastern European eDem and eGov Days 338 (July 15, 2020): 161–71. http://dx.doi.org/10.24989/ocg.338.13.
Full textCantika, Suci, and Annisa Umniyah. "Analysis of the Australian Government’s Security Strategy in Countering the Potential Threat of Terrorism Groups Through Cyber Terrorism Instruments." Insignia: Journal of International Relations 10, no. 2 (2023): 214. http://dx.doi.org/10.20884/1.ins.2023.10.2.9376.
Full textVASILEVA, Violeta, and Veselina ALEKSANDROVA GAGAMOVA. "Application of NATO Models for Building Information Infrastructure in Crisis Situations." Romanian Military Thinking 2024, no. 4 (2024): 232–47. https://doi.org/10.55535/rmt.2024.4.15.
Full textVASILEVA, Violeta, and Veselina ALEKSANDROVA GAGAMOVA. "Aplicarea modelelor NATO pentru constituirea infrastructurii informaționale în situații de criză." Gândirea Militară Românească 2024, no. 4 (2024): 226–43. https://doi.org/10.55535/gmr.2024.4.14.
Full textMori, Shigeo, and Atsuhiro Goto. "Reviewing National Cybersecurity Strategies." Journal of Disaster Research 13, no. 5 (2018): 957–66. http://dx.doi.org/10.20965/jdr.2018.p0957.
Full textNeal, Patrick. "Information Through the Lens of Safety and Security." Journal of Intelligence, Conflict, and Warfare 6, no. 1 (2023): 64–67. http://dx.doi.org/10.21810/jicw.v6i1.5407.
Full textBrovchenko, Y. "SOME ISSUES FROM THE EXPERIENCE OF EUROPEAN UNION COUNTRIES RELATING TO COUNTERACTION TO COLLABORATIVE ACTIVITIES IN UKRAINE." Scientific heritage, no. 159 (April 27, 2025): 43–51. https://doi.org/10.5281/zenodo.15292294.
Full textZvozdetska, Oksana. "NATO’s new strategic concept in cybersecurity issues in the context of up-to-the date vulnerability and threat information." Mediaforum : Analytics, Forecasts, Information Management, no. 6 (December 17, 2018): 71–93. http://dx.doi.org/10.31861/mediaforum.2018.6.71-93.
Full textKosiński, Jerzy, Tomasz Gontarz, and Robert Kośla. "Cybersecurity and the Handling of Cyber Incidents." Internal Security 10, no. 2 (2019): 107–28. http://dx.doi.org/10.5604/01.3001.0013.4219.
Full textOrlovskyi, Ruslan Semenovych, and Vasyl Mykhailovych Kozak. "Criminal law protection of state secrets in the context of hybrid warfare." Kriminologija & socijalna integracija 33, no. 1 (2025): 85–106. https://doi.org/10.31299/ksi.33.1.5.
Full textYankova, Alexandra. "Architecture of China’s Cyber Sovereignty Concept (Based on the Reports World Internet Conference “Sovereignty in Cyberspace: Theory and Practice”." Problemy dalnego vostoka, no. 4 (2023): 99. http://dx.doi.org/10.31857/s013128120026886-5.
Full textIbitamuno, Pamela Victor. "Legal Frameworks for Cybersecurity in Nigeria - Adapting The Fourth Industrial Revolution." Advances in Multidisciplinary and scientific Research Journal Publication 2, no. 1 (2023): 97–104. http://dx.doi.org/10.22624/aims/csean-smart2023p12.
Full textMaina, Lucy W., and Godfred Ohndyl Otieno. "Leveraging Technology for Government Service Delivery: Suggestions for Securing the eCitizen Services in Kenya." East African Journal of Information Technology 7, no. 1 (2024): 81–91. http://dx.doi.org/10.37284/eajit.7.1.1757.
Full textOcieczek, Grzegorz. "The Internal Security Agency and Poland’s Critical Infrastructure Protection: Challenges and Solutions." European Integration Studies 20, no. 2 (2024): 319–43. https://doi.org/10.46941/2024.2.13.
Full textSogo, Angel Olofinbiyi. "A reassessment of public awareness and legislative framework on cybersecurity in South Africa." ScienceRise: Juridical Science, no. 2(20) (June 30, 2022): 34–42. https://doi.org/10.15587/2523-4153.2022.259764.
Full textSemenenko, Oleh, Uzef Dobrovolskyi, Maryna Sliusarenko, Ihor Levchenko, and Serhii Mytchenko. "Legal aspects of the cybertechnology development and the cyberweapon use in the state defence sphere: Global and Ukrainian experience." Social Legal Studios 6, no. 4 (2023): 192–99. http://dx.doi.org/10.32518/sals4.2023.192.
Full textBROZIC, LILIANA. "INTERNATIONAL SECURITY COMMUNITY AT THE CROSSROADS." CONTEMPORARY MILITARY CHALLENGES, VOLUME 2016/ ISSUE 18/2 (June 30, 2016): 11–13. http://dx.doi.org/10.33179/bsv.99.svi.11.cmc.18.2.00.
Full textŠepec, Miha, and Maša Kočivnik. "Combatting Cyberwarfare Crimes in the European Union." European Integration Studies 20, no. 2 (2024): 409–32. https://doi.org/10.46941/2024.2.16.
Full textWillems, Daan, Katharina Kohls, Bob van der Kamp, and Harald Vranken. "Data Exfiltration Detection on Network Metadata with Autoencoders." Electronics 12, no. 12 (2023): 2584. http://dx.doi.org/10.3390/electronics12122584.
Full textAdebayo Adedoyin, Oluwakemi Farinde, Omotayo Ogunsola, Nonso Fred Chiobi, and Omolola Akinola. "Breach prevention strategies for cybersecurity in US SMEs and healthcare organizations description." World Journal of Advanced Research and Reviews 26, no. 2 (2025): 3068–95. https://doi.org/10.30574/wjarr.2025.26.2.0049.
Full textSzynkiewicz, Wojciech, Włodzimierz Kasprzak, Cezary Zieliński, et al. "Utilisation of Embodied Agents in the Design of Smart Human–Computer Interfaces—A Case Study in Cyberspace Event Visualisation Control." Electronics 9, no. 6 (2020): 976. http://dx.doi.org/10.3390/electronics9060976.
Full textBrett, Mark, Joshua Wood, and Jamie Parker. "Cyber incident response approach framework for local government." Cyber Security: A Peer-Reviewed Journal, June 1, 2020. http://dx.doi.org/10.69554/jpep6952.
Full textBrett, Mark. "A principles-led approach to information assurance and governance in local government." Cyber Security: A Peer-Reviewed Journal, June 1, 2022. http://dx.doi.org/10.69554/rnyg8837.
Full text"Malware Classification for Cyber Physical System (CPS) based on Phylogenetics." International Journal of Engineering and Advanced Technology 9, no. 1 (2019): 3666–70. http://dx.doi.org/10.35940/ijeat.a2711.109119.
Full textPiazza, Anna, Srinidhi Vasudevan, and Madeline Carr. "Cybersecurity in UK Universities: mapping (or managing) threat intelligence sharing within the higher education sector." Journal of Cybersecurity 9, no. 1 (2023). http://dx.doi.org/10.1093/cybsec/tyad019.
Full textChhabra Roy, Neha, and Sreeleakha Prabhakaran. "Internal-led cyber frauds in Indian banks: an effective machine learning–based defense system to fraud detection, prioritization and prevention." Aslib Journal of Information Management, August 12, 2022. http://dx.doi.org/10.1108/ajim-11-2021-0339.
Full textKerigan-Kyrou, Dinos A. "Irish Defence Forces: An Cosantóir - Defining Our Approach to Cybersecurity . Kerigan-Kyrou D.A." February 1, 2018. https://doi.org/10.5281/zenodo.3593357.
Full textMakoshi, Stephen Mikah. "Cyber Warfare and Nation-State Attack: Investigating Tactics, Techniques, and Procedures (TTPs) of State-Sponsored Cyberattacks and Defense Mechanisms By Stephen Mikah Makoshi May, 2025." May 14, 2025. https://doi.org/10.5281/zenodo.15412985.
Full text"National Cyber Security Centre: Annual Review 2018." Network Security 2018, no. 11 (2018): 4. http://dx.doi.org/10.1016/s1353-4858(18)30108-9.
Full textIbrahim, Azian, Noorfadhleen Mahmud, Nadrawina Isnin, Dina Hazelbella Dillah, and Dayang Nurfauziah Fauz Dillah. "Cyber Warfare Impact to National Security - Malaysia Experiences." KnE Social Sciences, August 18, 2019. http://dx.doi.org/10.18502/kss.v3i22.5052.
Full textBrett, Mark. "An approach to establishing a multi-organisational public sector security operations centre." Cyber Security: A Peer-Reviewed Journal, July 1, 2023. http://dx.doi.org/10.69554/jdgl5623.
Full textJoseph, Shawn. "Empowering boards: How the National Cyber Security Centre Board (United Kingdom) toolkit is transforming cyber security governance." Injury, June 2023, 110897. http://dx.doi.org/10.1016/j.injury.2023.110897.
Full text"Leading The Fight Against Cybercrime." New Electronics 51, no. 7 (2018): 9. http://dx.doi.org/10.12968/s0047-9624(23)60012-4.
Full textTarka, Mitchell, Michael Blankstein, and Patrick Schottel. "Reply to: Empowering Boards: How the National Cyber Security Centre Board (United Kingdom) Toolkit is Transforming Cyber Security Governance." Injury, September 2023, 111013. http://dx.doi.org/10.1016/j.injury.2023.111013.
Full textManjunath H R, Prashanth N M, Prathiksha L Shetty, Preethi M Rao, and Prenita Prinsal Saldanha. "A Review on Cyber Security." International Journal of Advanced Research in Science, Communication and Technology, August 27, 2022, 614–18. http://dx.doi.org/10.48175/ijarsct-7025.
Full textMeshram, Bandu B., and Manish Kumar Singh. "Research Areas in Cyber Security and Forensic and Centre of Excellence for Forensic Laboratory." Journal of Web Applications and Cyber Security, June 25, 2023, 11–28. http://dx.doi.org/10.48001/jowacs.2023.1111-28.
Full textDoeland, Marco. "Collaboration and the sharing of information help reduce payment transactions fraud." Journal of Payments Strategy & Systems, March 1, 2017. http://dx.doi.org/10.69554/qecm6150.
Full textAshraf, Nageen. "INDIA’S CYBER LANDSCAPE: AN ASSESSMENT OFINDIAN EFFORTS SINCE INDEPENDENCE." Journal of Contemporary Studies, February 28, 2024, 108–23. http://dx.doi.org/10.54690/jcr.2023(xii-ii).13772.
Full textAshraf, Nageen. "INDIA'S CYBER LANDSCAPE: AN ASSESMENT OF INDIAN EFFORTS SINCE INDEPENDENCE." Journal of Contemporary Studies, February 28, 2024, 108–23. http://dx.doi.org/10.54690/jcs.v12i2.269.
Full textSangster, Mark. "The three Ps of third-party risk." Cyber Security: A Peer-Reviewed Journal, June 1, 2020. http://dx.doi.org/10.69554/qpkr7301.
Full textCesarec, Ivana. "Beyond Physical Threats: Cyber-attacks on Critical Infrastructure as a Challenge of Changing Security Environment – Overview of Cyber-security legislation and implementation in SEE Countries." Annals of Disaster Risk Sciences 3, no. 1 (2020). http://dx.doi.org/10.51381/adrs.v3i1.45.
Full textKerigan-Kyrou, Dinos A. "Irish Defence Forces - An Cosantóir. 'Cybersecurity & the Internet of Things - Transforming Our Approach to Defence'. Kerigan-Kyrou D.A." April 1, 2019. https://doi.org/10.5281/zenodo.3593880.
Full textKerigan-Kyrou, Dinos Anthony. "An Cosantóir, Irish Defence Forces, 'Defeating the Pandemic, Defending Our Critical Infrastructure, and Securing Cyberspace: Battles We Cannot Afford to Lose'." June 1, 2020. https://doi.org/10.5281/zenodo.5193564.
Full text