Letteratura scientifica selezionata sul tema "CyberSecurty"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "CyberSecurty".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Articoli di riviste sul tema "CyberSecurty"
Ham, Jeroen Van Der. "Toward a Better Understanding of “Cybersecurity”". Digital Threats: Research and Practice 2, n. 3 (luglio 2021): 1–3. http://dx.doi.org/10.1145/3442445.
Testo completoCalliess, Christian, e Ansgar Baumgarten. "Cybersecurity in the EU The Example of the Financial Sector: A Legal Perspective". German Law Journal 21, n. 6 (settembre 2020): 1149–79. http://dx.doi.org/10.1017/glj.2020.67.
Testo completoCampbell, Robert D. "Cybersecurity". ACM SIGCSE Bulletin 35, n. 2 (giugno 2003): 24–26. http://dx.doi.org/10.1145/782941.782965.
Testo completoBOHATY, ROCHELLE F. H. "CYBERSECURITY". Chemical & Engineering News 86, n. 44 (3 novembre 2008): 18–20. http://dx.doi.org/10.1021/cen-v086n044.p018.
Testo completoPullin, Dennis W. "Cybersecurity". Frontiers of Health Services Management 35, n. 1 (2018): 3–12. http://dx.doi.org/10.1097/hap.0000000000000038.
Testo completoCACM Staff. "Cybersecurity". Communications of the ACM 60, n. 4 (24 marzo 2017): 20–21. http://dx.doi.org/10.1145/3051455.
Testo completoMaurer, Chris, Kevin Kim, Dan Kim e Leon A. Kappelman. "Cybersecurity". Communications of the ACM 64, n. 2 (25 gennaio 2021): 28–30. http://dx.doi.org/10.1145/3399667.
Testo completoRatnayake, Deepthi. "Cybersecurity". ITNOW 64, n. 1 (17 febbraio 2022): 37. http://dx.doi.org/10.1093/itnow/bwac019.
Testo completoRatnayake, Deepthi. "Cybersecurity". ITNOW 64, n. 2 (12 maggio 2022): 49. http://dx.doi.org/10.1093/itnow/bwac056.
Testo completoTagarev, Todor. "Intelligence, Crime and Cybersecurity". Information & Security: An International Journal 31 (2014): 05–06. http://dx.doi.org/10.11610/isij.3100.
Testo completoTesi sul tema "CyberSecurty"
Петрухно, Ігор Русланович. "Data Mining та машинні техніки навчання для виявлення вторгнення в кібербезпеку робототехнічних та автономних систем". Master's thesis, Київ, 2018. https://ela.kpi.ua/handle/123456789/26428.
Testo completoThe paper deals with the problem of cybersecurity associated with methods of analysis of large data sets for robotic systems. The object of this work is a research system based on the methodology of parallel computing using Hadoop tools. The subject is the methods and processes of Data Mining and machine learning techniques to detect the invasion of the cybersecurity of robotic and autonomous systems. In the given work, the main features of the existing system (SIEM) are considered. which allows processing large volumes of data, its advantages and disadvantages, Analysis of the tactics for constructing the Security Analitics System, which affect the accuracy, reliability, performance, scalability of project IDS systems. A research system implemented on the basis of parallel computing methodology using the Hadoop tools, which provides effective operation under attack conditions. This system can be used in the activities of a particular institution, and can also be used by other institutions to improve parallel computing using Hadoop tools, this concept can also be used as a methodological guide for the development of a system for detecting cybersecurity robotic and autonomous systems . Allows you to increase the speed of data processing and reduce the time of data analysis using the MapReduce paradigm. The size of the explanatory note is 111 sheets, contains 31 illustrations, 26 tables, 5 appendices.
Poluzzi, Lorenzo. "IA & Cybersecurity". Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020.
Cerca il testo completoHoward, David J. "Development of the Cybersecurity Attitudes Scale and Modeling Cybersecurity Behavior and its Antecedents". Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7306.
Testo completoLingelbach, Kembley Kay. "Perceptions of Female Cybersecurity Professionals Toward Factors that Encourage Females to the Cybersecurity Field". Diss., NSUWorks, 2018. https://nsuworks.nova.edu/gscis_etd/1056.
Testo completoTagert, Adam C. "Cybersecurity Challenges in Developing Nations". Research Showcase @ CMU, 2010. http://repository.cmu.edu/dissertations/22.
Testo completoFalco, Gregory J. "Cybersecurity for urban critical infrastructure". Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/118226.
Testo completoCataloged from PDF version of thesis.
Includes bibliographical references (pages 110-116).
Our cities are under attack. Urban critical infrastructure which includes the electric grid, water networks, transportation systems and public health and safety services are constantly being targeted by cyberattacks. Urban critical infrastructure has been increasingly connected to the internet for the purpose of operational convenience and efficiency as part of the growing Industrial Internet of Things (HoT). Unfortunately, when deciding to connect these systems, their cybersecurity was not taken seriously. A hacker can monitor, access and change these systems at their discretion because of the infrastructure's lack of security. This is not only a matter of potential inconvenience. Digital manipulation of these devices can have devastating physical consequences. This dissertation describes three steps cities should take to prepare for cyberattacks and defend themselves accordingly. First, cities must understand how an attacker might compromise its critical infrastructure. In the first chapter, I describe and demonstrate a methodology for enumerating attack vectors across a citys CCTV security system. The attack methodology uses established cybersecurity typologies to develop an attack ruleset for an Al planner that was programmed to perform attack generation. With this, cities can automatically determine all possible approaches hackers can take to compromise their critical infrastructure. Second, cities need to prioritize their cyber risks. There are hundreds of attack permutations for a given system and thousands for a city. In the second chapter, I develop a risk model for urban critical infrastructure. The model helps prioritize vulnerabilities that are frequently exploited for HoT Supervisory Control and Data Acquisition (SCADA) systems. Finally, cities need tools to defend themselves. In the third chapter, I present a nontechnical approach to defending against attacks called cyber negotiation. Cyber negotiation is one of several non-technical cyberdefense tools I call Defensive Social Engineering, where victims can use social engineering against the hacker. Cyber negotiation involves using a negotiation framework to defend against attacks with steps urban critical infrastructure operators can take before, during and after an attack. This study combines computer science and urban planning (Urban Science) to provide a starting point for cities to prepare for and protect themselves against cyberattacks.
by Gregory J. Falco.
Ph. D.
Pierce, Adam O. "Exploring the Cybersecurity Hiring Gap". ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/3198.
Testo completoReid, Rayne. "Guidelines for cybersecurity education campaigns". Thesis, Nelson Mandela University, 2017. http://hdl.handle.net/10948/14091.
Testo completoNilsen, Richard. "Measuring Cybersecurity Competency: An Exploratory Investigation of the Cybersecurity Knowledge, Skills, and Abilities Necessary for Organizational Network Access Privileges". NSUWorks, 2017. http://nsuworks.nova.edu/gscis_etd/1017.
Testo completoTaiola, Matteo. "Cybersecurity in impianti dell'industria di processo". Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021.
Cerca il testo completoLibri sul tema "CyberSecurty"
Guiora, Amos N. Cybersecurity. Boca Raton, FL : Routledge, 2017.: Routledge, 2017. http://dx.doi.org/10.1201/9781315370231.
Testo completoBrooks, Charles J., Christopher Grow, Philip Craig e Donald Short. Cybersecurity. Indianapolis, Indiana: John Wiley & Sons, Inc., 2018. http://dx.doi.org/10.1002/9781119369141.
Testo completoKumar, Gautam, Om Prakash Singh e Hemraj Saini. Cybersecurity. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003145042.
Testo completoAbd El-Latif, Ahmed A., e Christos Volos, a cura di. Cybersecurity. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-92166-8.
Testo completoDonaldson, Scott E., Stanley G. Siegel, Chris K. Williams e Abdul Aslam. Enterprise Cybersecurity. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4302-6083-7.
Testo completoConti, Mauro, Gaurav Somani e Radha Poovendran, a cura di. Versatile Cybersecurity. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-97643-3.
Testo completoWaschke, Marvin. Personal Cybersecurity. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-2430-4.
Testo completoAyala, Luis. Cybersecurity Lexicon. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2068-9.
Testo completoBeissel, Stefan. Cybersecurity Investments. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30460-1.
Testo completoKaplan, James M., Tucker Bailey, Chris Rezek, Derek O'Halloran e Alan Marcus, a cura di. Beyond Cybersecurity. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781119055228.
Testo completoCapitoli di libri sul tema "CyberSecurty"
Wolfe, Jennifer C. "Cybersecurity". In Disruption in the Boardroom, 51–82. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6159-0_4.
Testo completoZaffar, Ehsan. "Cybersecurity". In Understanding Homeland Security, 399–439. Abingdon, Oxon; New York. NY: Routledge, 2019. |: Routledge, 2019. http://dx.doi.org/10.4324/9780323296243-8.
Testo completoJackson, Scott, e Ricardo Moraes dos Santos. "Cybersecurity". In Systems Approach to the Design of Commercial Aircraft, 57–60. First edition. | Boca Raton, FL : CRC Press, 2020.: CRC Press, 2020. http://dx.doi.org/10.1201/9781003053750-12.
Testo completoKulesza, Joanna. "Cybersecurity". In Encyclopedia of Big Data, 1–5. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-32001-4_53-1.
Testo completoRefsdal, Atle, Bjørnar Solhaug e Ketil Stølen. "Cybersecurity". In Cyber-Risk Management, 29–32. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23570-7_4.
Testo completoRoy, Jeffrey. "Cybersecurity". In Public Administration and Information Technology, 59–68. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-7221-6_5.
Testo completoSiers, Rhea. "Cybersecurity". In Security Studies, 556–68. Third edition. | New York : Routledge, 2018. |: Routledge, 2018. http://dx.doi.org/10.4324/9781315228358-38.
Testo completoWichum, Ricky. "Cybersecurity". In Handbuch Virtualität, 1–13. Wiesbaden: Springer Fachmedien Wiesbaden, 2018. http://dx.doi.org/10.1007/978-3-658-16358-7_36-1.
Testo completoWichum, Ricky. "Cybersecurity". In Handbuch Virtualität, 669–80. Wiesbaden: Springer Fachmedien Wiesbaden, 2020. http://dx.doi.org/10.1007/978-3-658-16342-6_36.
Testo completoIslam, Md Shariful. "Cybersecurity". In Routledge Companion to Global Cyber-Security Strategy, 349–55. New York : Routledge, 2020.: Routledge, 2020. http://dx.doi.org/10.4324/9780429399718-29.
Testo completoAtti di convegni sul tema "CyberSecurty"
Abdel-Fattah, Farhan, Fadel AlTamimi e Khalid A. Farhan. "Machine Learning and Data Mining in Cybersecurty". In 2021 International Conference on Information Technology (ICIT). IEEE, 2021. http://dx.doi.org/10.1109/icit52682.2021.9491749.
Testo completoRossi, Paola, Itai Sela, Adam Rizika, Diogenes Angelidis, Mark Duck e Ron Morrison. "Cyberdefence of Offshore Deepwater Drilling Rigs". In Offshore Technology Conference. OTC, 2021. http://dx.doi.org/10.4043/31235-ms.
Testo completoDlamini, Moses, Hein Venter, Jan Eloff e Mariki Eloff. "Digital deception in cybersecurity: an information behaviour lens". In ISIC: the Information Behaviour Conference. University of Borås, Borås, Sweden, 2020. http://dx.doi.org/10.47989/irisic2018.
Testo completoKim, Euiyoung, Jieun Kwon, JungKyoon Yoon e Alice M. Agogino. "Embedding Cybersecurity Into Design Education: Increasing Designers’ Awareness of Cybersecurity Throughout the Design Process". In ASME 2019 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2019. http://dx.doi.org/10.1115/detc2019-97720.
Testo completoEasttom, Chuck. "Applying Mathematics and Engineering Techniques to Cyber Security". In Congreso Internacional de Ingeniería de Sistemas. Universidad de Lima, 2021. http://dx.doi.org/10.26439/ciis2021.5575.
Testo completoChopra, Shubham, Hitesh Marwaha e Anurag Sharma. "Cyber-Attacks Identification and Measures for Prevention". In International Conference on Cybersecurity and Cybercrime. Romanian Association for Information Security Assurance, 2022. http://dx.doi.org/10.19107/cybercon.2022.11.
Testo completoKemmerer, R. A. "Cybersecurity". In 25th International Conference on Software Engineering, 2003. Proceedings. IEEE, 2003. http://dx.doi.org/10.1109/icse.2003.1201257.
Testo completoMaymí, Fernando J. "Cybersecurity". In SIGITE '19: The 20th Annual Conference on Information Technology Education. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3349266.3355613.
Testo completoThapa, Bipun. "Sentiment Analysis of Cyber Security Content on Twitter and Reddit". In 3rd International Conference on Data Mining and Machine Learning (DMML 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.120708.
Testo completo"Cybersecurity, IT-aided Education, and TeLEs: Nexus, Vistas & Realities". In InSITE 2019: Informing Science + IT Education Conferences: Jerusalem. Informing Science Institute, 2019. http://dx.doi.org/10.28945/4153.
Testo completoRapporti di organizzazioni sul tema "CyberSecurty"
Joo, Jhi Young, Emma Stewart, Benjamin Salazar e Nathan Yee. Selection of Ten (10) Cybersecurity Scenarios For Project Cybersecure Interconnection of Distributed Energy Resources. Office of Scientific and Technical Information (OSTI), novembre 2018. http://dx.doi.org/10.2172/1498462.
Testo completoFlorakis, Chris, Christodoulos Louca, Roni Michaely e Michael Weber. Cybersecurity Risk. Cambridge, MA: National Bureau of Economic Research, dicembre 2020. http://dx.doi.org/10.3386/w28196.
Testo completoAlecu, Iulian, Costel Ciuchi, Toma Cimpeanu, Iulian Coman, Larisa Gabudeanu, Ioan-Cosmin Mihai, Cosmina Moghior et al. Cybersecurity Guide. Romanian Association for Information Security Assurance, gennaio 2021. http://dx.doi.org/10.19107/cybersec.2021.en.
Testo completoGuice, Leslie K. Cybersecurity Laboratory & Cybersecurity Research Program at the CRL. Fort Belvoir, VA: Defense Technical Information Center, agosto 2014. http://dx.doi.org/10.21236/ada608802.
Testo completoNewhouse, William, Stephanie Keith, Benjamin Scribner e Greg Witte. National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework. Gaithersburg, MD: National Institute of Standards and Technology, agosto 2017. http://dx.doi.org/10.6028/nist.sp.800-181.
Testo completoNewhouse, William, Stephanie Keith, Benjamin Scribner e Greg Witte. National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (Portuguese translation). National Institute of Standards and Technology, febbraio 2022. http://dx.doi.org/10.6028/nist.sp.800-181pt.
Testo completoNewhouse, William, Stephanie Keith, Benjamin Scribner e Greg Witte. National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (Spanish translation). National Institute of Standards and Technology, febbraio 2022. http://dx.doi.org/10.6028/nist.sp.800-181es.
Testo completoNewhouse, Bill. National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (Ukrainian translation). National Institute of Standard and Technology, maggio 2022. http://dx.doi.org/10.6028/nist.sp.800-181.ukr.
Testo completoJohnson, Jay Tillay. PV Cybersecurity Final Report. Office of Scientific and Technical Information (OSTI), gennaio 2019. http://dx.doi.org/10.2172/1491601.
Testo completoStouffer, Keith, Timothy Zimmerman, CheeYee Tang, Joshua Lubell, Jeffrey Cichonski e John McCarthy. Cybersecurity framework manufacturing profile. Gaithersburg, MD: National Institute of Standards and Technology, settembre 2017. http://dx.doi.org/10.6028/nist.ir.8183.
Testo completo