Articoli di riviste sul tema "CyberSecurty"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "CyberSecurty".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Ham, Jeroen Van Der. "Toward a Better Understanding of “Cybersecurity”". Digital Threats: Research and Practice 2, n. 3 (luglio 2021): 1–3. http://dx.doi.org/10.1145/3442445.
Testo completoCalliess, Christian, e Ansgar Baumgarten. "Cybersecurity in the EU The Example of the Financial Sector: A Legal Perspective". German Law Journal 21, n. 6 (settembre 2020): 1149–79. http://dx.doi.org/10.1017/glj.2020.67.
Testo completoCampbell, Robert D. "Cybersecurity". ACM SIGCSE Bulletin 35, n. 2 (giugno 2003): 24–26. http://dx.doi.org/10.1145/782941.782965.
Testo completoBOHATY, ROCHELLE F. H. "CYBERSECURITY". Chemical & Engineering News 86, n. 44 (3 novembre 2008): 18–20. http://dx.doi.org/10.1021/cen-v086n044.p018.
Testo completoPullin, Dennis W. "Cybersecurity". Frontiers of Health Services Management 35, n. 1 (2018): 3–12. http://dx.doi.org/10.1097/hap.0000000000000038.
Testo completoCACM Staff. "Cybersecurity". Communications of the ACM 60, n. 4 (24 marzo 2017): 20–21. http://dx.doi.org/10.1145/3051455.
Testo completoMaurer, Chris, Kevin Kim, Dan Kim e Leon A. Kappelman. "Cybersecurity". Communications of the ACM 64, n. 2 (25 gennaio 2021): 28–30. http://dx.doi.org/10.1145/3399667.
Testo completoRatnayake, Deepthi. "Cybersecurity". ITNOW 64, n. 1 (17 febbraio 2022): 37. http://dx.doi.org/10.1093/itnow/bwac019.
Testo completoRatnayake, Deepthi. "Cybersecurity". ITNOW 64, n. 2 (12 maggio 2022): 49. http://dx.doi.org/10.1093/itnow/bwac056.
Testo completoTagarev, Todor. "Intelligence, Crime and Cybersecurity". Information & Security: An International Journal 31 (2014): 05–06. http://dx.doi.org/10.11610/isij.3100.
Testo completoBackman, Sarah. "Organising National Cybersecurity Centres". Information & Security: An International Journal 32 (2015): 9–26. http://dx.doi.org/10.11610/isij.3206.
Testo completoTasevski, Predrag. "Macedonian Path Towards Cybersecurity". Information & Security: An International Journal 32 (2015): 109–19. http://dx.doi.org/10.11610/isij.3204.
Testo completoCALATAYUD MARTÍ, PILAR, JULIAN ROMERO CHAVARRO, MARIO MONTAGUD AGUAR, LUCIA ARCOS USERO, MARTA GARCÍA PELLICER e ALFREDO QUIJANO LÓPEZ. "THREE-LEVEL METHODOLOGY FOR SECURE AND EFFICIENT GRID INTEGRATION OF ELECTRIC VEHICLE". DYNA 96, n. 3 (1 maggio 2021): 264–69. http://dx.doi.org/10.6036/10013.
Testo completoTsvilii, Olena. "Cybersecurity regulation: cybersecurity certification of operational technologies". Technology audit and production reserves 1, n. 2(57) (28 febbraio 2021): 54–60. http://dx.doi.org/10.15587/2706-5448.2021.225271.
Testo completoWang, Shouhong, e Hai Wang. "A Sociotechnical Systems Analysis of Knowledge Management for Cybersecurity". International Journal of Sociotechnology and Knowledge Development 13, n. 3 (luglio 2021): 77–94. http://dx.doi.org/10.4018/ijskd.2021070105.
Testo completoCraigen, Dan, Nadia Diakun-Thibault e Randy Purse. "Defining Cybersecurity". Technology Innovation Management Review 4, n. 10 (30 ottobre 2014): 13–21. http://dx.doi.org/10.22215/timreview835.
Testo completoCraigen, Dan, Nadia Diakun-Thibault e Randy Purse. "Defining Cybersecurity". Technology Innovation Management Review 4, n. 10 (30 ottobre 2014): 13–21. http://dx.doi.org/10.22215/timreview/835.
Testo completoOleinik, Margarita, e Tatyana Porubel. "Agroholdings cybersecurity". Proceedings of the Kuban State Agrarian University 1, n. 78 (2019): 33–41. http://dx.doi.org/10.21515/1999-1703-78-33-41.
Testo completoTalbot, Edward B., Deborah Frincke e Matt Bishop. "Demythifying Cybersecurity". IEEE Security & Privacy Magazine 8, n. 3 (maggio 2010): 56–59. http://dx.doi.org/10.1109/msp.2010.95.
Testo completoKim, Lee. "Cybersecurity awareness". Nursing 47, n. 6 (giugno 2017): 65–67. http://dx.doi.org/10.1097/01.nurse.0000516242.05454.b4.
Testo completoRadziwill, Nicole M. "Cybersecurity Leadership". Quality Management Journal 25, n. 2 (3 aprile 2018): 109. http://dx.doi.org/10.1080/10686967.2018.1436356.
Testo completoReagin, Michael J., e Michael V. Gentry. "Enterprise Cybersecurity". Frontiers of Health Services Management 35, n. 1 (2018): 13–22. http://dx.doi.org/10.1097/hap.0000000000000037.
Testo completoLukowiak, Marcin, Stanisław Radziszowski, James Vallino e Christopher Wood. "Cybersecurity Education". ACM Transactions on Computing Education 14, n. 1 (marzo 2014): 1–20. http://dx.doi.org/10.1145/2538029.
Testo completoBaranchuk, Adrian, Bryce Alexander, Debra Campbell, Sohaib Haseeb, Damian Redfearn, Chris Simpson e Ben Glover. "Pacemaker Cybersecurity". Circulation 138, n. 12 (18 settembre 2018): 1272–73. http://dx.doi.org/10.1161/circulationaha.118.035261.
Testo completoKim, Lee. "Cybersecurity awareness". Nursing Management (Springhouse) 48, n. 4 (aprile 2017): 16–19. http://dx.doi.org/10.1097/01.numa.0000514066.30572.f3.
Testo completoKim, Lee. "Cybersecurity matters". Nursing Management (Springhouse) 49, n. 2 (febbraio 2018): 16–22. http://dx.doi.org/10.1097/01.numa.0000529921.97762.be.
Testo completoKuhn, Rick. "Introduction: Cybersecurity". IT Professional 12, n. 4 (luglio 2010): 18–19. http://dx.doi.org/10.1109/mitp.2010.110.
Testo completoRatnayake, Deepthi. "Insight: Cybersecurity". ITNOW 63, n. 2 (1 giugno 2021): 41. http://dx.doi.org/10.1093/itnow/bwab052.
Testo completoPOPESCU, Eugen F. "Complementary Cybersecurity". International Journal of Information Security and Cybercrime 9, n. 2 (30 dicembre 2020): 33–37. http://dx.doi.org/10.19107/ijisc.2020.02.05.
Testo completoRatnayake, Deepthi. "Insight: cybersecurity". ITNOW 63, n. 4 (1 dicembre 2021): 39. http://dx.doi.org/10.1093/itnow/bwab118.
Testo completoRatnayake, Deepthi. "Insight: Cybersecurity". ITNOW 63, n. 3 (16 agosto 2021): 39. http://dx.doi.org/10.1093/itnow/bwab082.
Testo completoGritzalis, Dimitris A., Grammati Pantziou e Rodrigo Román-Castro. "Sensors Cybersecurity". Sensors 21, n. 5 (4 marzo 2021): 1762. http://dx.doi.org/10.3390/s21051762.
Testo completoMaconachy, W. V., e D. Kinsey. "Cybersecurity Education". Journal of The Colloquium for Information Systems Security Education 9, n. 1 (8 marzo 2022): 4. http://dx.doi.org/10.53735/cisse.v9i1.138.
Testo completoBurley, Diana L., Jon Eisenberg e Seymour E. Goodman. "Would cybersecurity professionalization help address the cybersecurity crisis?" Communications of the ACM 57, n. 2 (febbraio 2014): 24–27. http://dx.doi.org/10.1145/2556936.
Testo completoLAGE SERRANO, OSCAR, e MARIA SAIZ SANTOS. "BLOCKCHAIN AND THE DECENTRALISATION OF THE CYBERSECURITY INDUSTRY". DYNA 96, n. 3 (1 maggio 2021): 239. http://dx.doi.org/10.6036/10188.
Testo completoCheng, Eric C. K., e Tianchong Wang. "Institutional Strategies for Cybersecurity in Higher Education Institutions". Information 13, n. 4 (12 aprile 2022): 192. http://dx.doi.org/10.3390/info13040192.
Testo completoAlammari, Abdullah, Osama Sohaib e Sayed Younes. "Developing and evaluating cybersecurity competencies for students in computing programs". PeerJ Computer Science 8 (17 gennaio 2022): e827. http://dx.doi.org/10.7717/peerj-cs.827.
Testo completoShires, James. "Enacting Expertise: Ritual and Risk in Cybersecurity". Politics and Governance 6, n. 2 (11 giugno 2018): 31–40. http://dx.doi.org/10.17645/pag.v6i2.1329.
Testo completoAnanda, Safrida, Ika Putranti e Andi Dir. "ANALYSIS OF THE EU CYBERSECURITY ACT UNDER THE THEORY OF NEOLIBERAL INSTITUTIONALISM". Arena Hukum 15, n. 1 (28 aprile 2022): 176–99. http://dx.doi.org/10.21776/ub.arenahukum.2022.01501.9.
Testo completoCoenraad, Merijke, Anthony Pellicone, Diane Jass Ketelhut, Michel Cukier, Jan Plane e David Weintrop. "Experiencing Cybersecurity One Game at a Time: A Systematic Review of Cybersecurity Digital Games". Simulation & Gaming 51, n. 5 (19 giugno 2020): 586–611. http://dx.doi.org/10.1177/1046878120933312.
Testo completoTsvilii, Olena. "SYSTEM OF CERTIFICATION OF CYBERSECURITY OF INFORMATION AND COMMUNICATIONS TECHNOLOGIES". Proceedings of the O.S. Popov ОNAT 1, n. 2 (31 dicembre 2020): 121–34. http://dx.doi.org/10.33243/2518-7139-2020-1-2-121-134.
Testo completoReeves, A., P. Delfabbro e D. Calic. "Encouraging Employee Engagement With Cybersecurity: How to Tackle Cyber Fatigue". SAGE Open 11, n. 1 (gennaio 2021): 215824402110000. http://dx.doi.org/10.1177/21582440211000049.
Testo completoMICHALSKI, Daniel. "System Approach to Coherent Cybersecurity Strategy". Safety & Defense 5, n. 1 (27 dicembre 2019): 31–36. http://dx.doi.org/10.37105/sd.39.
Testo completoCai, Cuihong. "Cybersecurity in the Chinese Context: Changing Concepts, Vital Interests, and Prospects for Cooperation". China Quarterly of International Strategic Studies 01, n. 03 (ottobre 2015): 471–96. http://dx.doi.org/10.1142/s2377740015500189.
Testo completoNobles, Calvin. "The Cyber Talent Gap and Cybersecurity Professionalizing". International Journal of Hyperconnectivity and the Internet of Things 2, n. 1 (gennaio 2018): 42–51. http://dx.doi.org/10.4018/ijhiot.2018010104.
Testo completoMakeri, Yakubu Ajiji. "The Effectiveness of Cybersecurity Compliance in a Corporate Organization in Nigeria". International Journal on Recent and Innovation Trends in Computing and Communication 7, n. 6 (11 giugno 2019): 16–19. http://dx.doi.org/10.17762/ijritcc.v7i6.5312.
Testo completoStoianov, Nikolai, e Andrey Ivanov. "Public Key Generation Principles Impact Cybersecurity". Information & Security: An International Journal 47, n. 2 (2020): 249–60. http://dx.doi.org/10.11610/isij.4717.
Testo completoPotii, Oleksandr V., Oleksandr V. Korneyko e Yrii I. Gorbenko. "Cybersecurity in Ukraine: Problems and Perspectives". Information & Security: An International Journal 32 (2015): 71–94. http://dx.doi.org/10.11610/isij.3201.
Testo completoMubarakova,, S. R., S. T. Amanzholova, e R. K. Uskenbayeva,. "USING MACHINE LEARNING METHODS IN CYBERSECURITY". Eurasian Journal of Mathematical and Computer Applications 10, n. 1 (marzo 2022): 69–78. http://dx.doi.org/10.32523/2306-6172-2022-10-1-69-78.
Testo completoHaapamäki, Elina, e Jukka Sihvonen. "Cybersecurity in accounting research". Managerial Auditing Journal 34, n. 7 (1 luglio 2019): 808–34. http://dx.doi.org/10.1108/maj-09-2018-2004.
Testo completo