Статті в журналах з теми "Cybersecurity frameworks"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Cybersecurity frameworks".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Taherdoost, Hamed. "Understanding Cybersecurity Frameworks and Information Security Standards—A Review and Comprehensive Overview." Electronics 11, no. 14 (July 12, 2022): 2181. http://dx.doi.org/10.3390/electronics11142181.
Повний текст джерелаAlghamdi, Ahmed. "Comparative Analysis of ISO27001 and NIST CSF." International Journal of Membrane Science and Technology 10, no. 4 (September 30, 2023): 1423–29. http://dx.doi.org/10.15379/ijmst.v10i4.2258.
Повний текст джерелаMelaku, Henock Mulugeta. "A Dynamic and Adaptive Cybersecurity Governance Framework." Journal of Cybersecurity and Privacy 3, no. 3 (June 30, 2023): 327–50. http://dx.doi.org/10.3390/jcp3030017.
Повний текст джерелаLee, In. "Internet of Things (IoT) Cybersecurity: Literature Review and IoT Cyber Risk Management." Future Internet 12, no. 9 (September 18, 2020): 157. http://dx.doi.org/10.3390/fi12090157.
Повний текст джерелаDedeke, Adenekan, and Katherine Masterson. "Contrasting cybersecurity implementation frameworks (CIF) from three countries." Information & Computer Security 27, no. 3 (July 8, 2019): 373–92. http://dx.doi.org/10.1108/ics-10-2018-0122.
Повний текст джерелаMalatji, Masike, Annlizé L. Marnewick, and Suné Von Solms. "Cybersecurity capabilities for critical infrastructure resilience." Information & Computer Security 30, no. 2 (October 14, 2021): 255–79. http://dx.doi.org/10.1108/ics-06-2021-0091.
Повний текст джерелаMalatji, Masike, Annlizé L. Marnewick, and Suné Von Solms. "Cybersecurity capabilities for critical infrastructure resilience." Information & Computer Security 30, no. 2 (October 14, 2021): 255–79. http://dx.doi.org/10.1108/ics-06-2021-0091.
Повний текст джерелаMPHATHENI, Mandlenkosi Richard. "Cybersecurity: An Appraisal of Policy Frameworks and Related Conventions." International Journal of Information Security and Cybercrime 12, no. 1 (June 28, 2023): 45–60. http://dx.doi.org/10.19107/ijisc.2023.01.06.
Повний текст джерелаAlSagri, Hatoon S., Shahab Saquib Sohail, and Shiju Sebastian. "The role of deep reinforcement learning in developing adaptive cybersecurity defenses for smart grid systems." Journal of Information and Optimization Sciences 45, no. 8 (2024): 2299–307. https://doi.org/10.47974/jios-1807.
Повний текст джерелаShelly, Elizabeth. "Cybersecurity Frameworks for Cloud Computing Environments." International Journal of Computing and Engineering 6, no. 1 (July 12, 2024): 30–44. http://dx.doi.org/10.47941/ijce.2058.
Повний текст джерелаAnkur Partap Kotwal. "Leveraging Big Data Analytics for Enhanced Cybersecurity: A Comprehensive Analysis of Threat Detection, Incident Response, and SIEM Systems." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 6 (December 22, 2024): 2158–64. https://doi.org/10.32628/cseit2410612414.
Повний текст джерелаFolorunsho, O. S., A. Q. Ayinde, M. A. Olagoke, and O. E. Fatoye. "Evaluating Cybersecurity Theories, Models, Standards and Frameworks." Advances in Multidisciplinary and scientific Research Journal Publication 5, no. 4 (December 30, 2019): 61–66. http://dx.doi.org/10.22624/aims/bhi/v5n4p7.
Повний текст джерелаVon Solms, Sune. "The Identification of Cybersecurity Work Roles for the Water Sector in South Africa." European Conference on Cyber Warfare and Security 22, no. 1 (June 19, 2023): 510–16. http://dx.doi.org/10.34190/eccws.22.1.1109.
Повний текст джерелаLawrence Damilare Oyeniyi, Chinonye Esther Ugochukwu, and Noluthando Zamanjomane Mhlongo. "DEVELOPING CYBERSECURITY FRAMEWORKS FOR FINANCIAL INSTITUTIONS: A COMPREHENSIVE REVIEW AND BEST PRACTICES." Computer Science & IT Research Journal 5, no. 4 (April 17, 2024): 903–25. http://dx.doi.org/10.51594/csitrj.v5i4.1049.
Повний текст джерелаTemitayo Oluwaseun Abrahams, Sarah Kuzankah Ewuga, Simon Kaggwa `, Prisca Ugomma Uwaoma `, Azeez Olanipekun Hassan, and Samuel Onimisi Dawodu. "MASTERING COMPLIANCE: A COMPREHENSIVE REVIEW OF REGULATORY FRAMEWORKS IN ACCOUNTING AND CYBERSECURITY." Computer Science & IT Research Journal 5, no. 1 (January 11, 2024): 120–40. http://dx.doi.org/10.51594/csitrj.v5i1.709.
Повний текст джерелаBabajide Tolulope Familoni and Philip Olaseni Shoetan. "CYBERSECURITY IN THE FINANCIAL SECTOR: A COMPARATIVE ANALYSIS OF THE USA AND NIGERIA." Computer Science & IT Research Journal 5, no. 4 (April 17, 2024): 850–77. http://dx.doi.org/10.51594/csitrj.v5i4.1046.
Повний текст джерелаTurk, Žiga, Muammer Semih Sonkor, and Robert Klinc. "CYBERSECURITY ASSESSMENT OF BIM/CDE DESIGN ENVIRONMENT USING CYBER ASSESSMENT FRAMEWORK." JOURNAL OF CIVIL ENGINEERING AND MANAGEMENT 28, no. 5 (May 3, 2022): 349–64. http://dx.doi.org/10.3846/jcem.2022.16682.
Повний текст джерелаAbhilash Maroju, Srinivas A Vaddadi, Sravanthi Dontu, Rohith Vallabhaneni,. "An Empirical Paradigm on Cybersecurity Vulnerability Mitigation Framework." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9s (August 31, 2023): 786–92. http://dx.doi.org/10.17762/ijritcc.v11i9s.9484.
Повний текст джерелаFatai Adeshina Adelani, Enyinaya Stefano Okafor, Boma Sonimiteim Jacks, and Olakunle Abayomi Ajala. "THEORETICAL FRAMEWORKS FOR THE ROLE OF AI AND MACHINE LEARNING IN WATER CYBERSECURITY: INSIGHTS FROM AFRICAN AND U.S. APPLICATIONS." Computer Science & IT Research Journal 5, no. 3 (March 22, 2024): 681–92. http://dx.doi.org/10.51594/csitrj.v5i3.928.
Повний текст джерелаSharma, Monu. "Cybersecurity Platforms: Tackling Challenges in a Digital Age." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 11 (November 23, 2024): 1–9. http://dx.doi.org/10.55041/ijsrem12257.
Повний текст джерелаHimanshu. "Cybersecurity Law: Challenges and Legal Frameworks for Protecting Digital Assets and Privacy Rights." Indian Journal of Law 2, no. 2 (April 30, 2024): 18–22. http://dx.doi.org/10.36676/ijl.v2.i2.05.
Повний текст джерелаRahul Khanna. "Cybersecurity Law: Challenges and Legal Frameworks for Protecting Digital Assets and Privacy Rights." Indian Journal of Law 2, no. 3 (July 1, 2024): 15–20. http://dx.doi.org/10.36676/ijl.v2.i3.28.
Повний текст джерелаMooghala, Sridhar. "An In - Depth Analysis of Cybersecurity Frameworks for Payment Applications." International Journal of Science and Research (IJSR) 10, no. 8 (August 5, 2021): 1250–54. http://dx.doi.org/10.21275/sr24304153706.
Повний текст джерелаRahul Kumar Jha, Amit Patel, and Birendra Kumar Shah. "Synergies and Challenges: Integrating Machine Learning, Blockchain Technology, and Regulatory Frameworks in Biomedical Cybersecurity." Journal of ISMAC 5, no. 3 (September 2023): 237–56. http://dx.doi.org/10.36548/jismac.2023.3.004.
Повний текст джерелаEmmanni, Phani Sekhar. "Federated Learning for Cybersecurity in Edge and Cloud Computing." International Journal of Computing and Engineering 5, no. 4 (March 12, 2024): 27–38. http://dx.doi.org/10.47941/ijce.1829.
Повний текст джерелаWallis, Tania, and Paul Dorey. "Implementing Partnerships in Energy Supply Chain Cybersecurity Resilience." Energies 16, no. 4 (February 14, 2023): 1868. http://dx.doi.org/10.3390/en16041868.
Повний текст джерелаIbitamuno, Pamela Victor. "Legal Frameworks for Cybersecurity in Nigeria - Adapting The Fourth Industrial Revolution." Advances in Multidisciplinary and scientific Research Journal Publication 2, no. 1 (July 30, 2023): 97–104. http://dx.doi.org/10.22624/aims/csean-smart2023p12.
Повний текст джерелаRAJ, ANGIRA. "ASSESSING THE IMPLICATIONS OF CYBERSECURITY THREATS ON THE ADOPTION OF FINTECH SOLUTIONS." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (May 6, 2024): 1–5. http://dx.doi.org/10.55041/ijsrem33381.
Повний текст джерелаGoel, Rajni, Anupam Kumar, and James Haddow. "PRISM: a strategic decision framework for cybersecurity risk assessment." Information & Computer Security 28, no. 4 (June 19, 2020): 591–625. http://dx.doi.org/10.1108/ics-11-2018-0131.
Повний текст джерелаAlhejaili, Mohammad Omar Mohammad. "Securing the Kingdom’s e-commerce frontier: Evaluation of Saudi Arabia’s cybersecurity legal frameworks." Journal of Governance and Regulation 13, no. 2, special issue (2024): 275–86. http://dx.doi.org/10.22495/jgrv13i2siart4.
Повний текст джерелаEl-Hajj, Mohammed, and Zuhayr Aamir Mirza. "ProtectingSmall and Medium Enterprises: A Specialized Cybersecurity Risk Assessment Framework and Tool." Electronics 13, no. 19 (October 2, 2024): 3910. http://dx.doi.org/10.3390/electronics13193910.
Повний текст джерелаNgozi Samuel Uzougbo, Chinonso Gladys Ikegwu, and Adefolake Olachi Adewusi. "Cybersecurity compliance in financial institutions: A comparative analysis of global standards and regulations." International Journal of Science and Research Archive 12, no. 1 (May 30, 2024): 533–48. http://dx.doi.org/10.30574/ijsra.2024.12.1.0802.
Повний текст джерелаShypovskyi, Volodymyr. "Decision-making process model for cybersecurity protection of critical infrastructure objects under the hybrid threats influence." Journal of Scientific Papers "Social Development and Security" 13, no. 3 (June 30, 2023): 43–55. http://dx.doi.org/10.33445/sds.2023.13.3.3.
Повний текст джерелаVishal Kumar Seshagirirao Anil and Adeoluwa Bennard Babatope. "The role of data governance in enhancing cybersecurity resilience for global enterprises." World Journal of Advanced Research and Reviews 24, no. 1 (October 30, 2024): 1420–32. http://dx.doi.org/10.30574/wjarr.2024.24.1.3171.
Повний текст джерелаAgyepong, Enoch. "The Need for Dynamic Cybersecurity." ITNOW 66, no. 3 (2024): 16–17. http://dx.doi.org/10.1093/itnow/bwae079.
Повний текст джерелаBoeding, Matthew, Kelly Boswell, Michael Hempel, Hamid Sharif, Juan Lopez, and Kalyan Perumalla. "Survey of Cybersecurity Governance, Threats, and Countermeasures for the Power Grid." Energies 15, no. 22 (November 19, 2022): 8692. http://dx.doi.org/10.3390/en15228692.
Повний текст джерелаNyamuchiwa, Kudakwashe, Zhen Lei, and Clodualdo Aranas. "Cybersecurity Vulnerabilities in Off-Site Construction." Applied Sciences 12, no. 10 (May 16, 2022): 5037. http://dx.doi.org/10.3390/app12105037.
Повний текст джерелаJonas, Dendy, Natasya Aprila Yusuf, and Achani Rahmania Az Zahra. "Enhancing Security Frameworks with Artificial Intelligence in Cybersecurity." International Transactions on Education Technology (ITEE) 2, no. 1 (November 15, 2023): 83–91. http://dx.doi.org/10.33050/itee.v2i1.428.
Повний текст джерелаAdebayo Omowunmi Temitope, LawalYusufAdedayo, and Braimoh Kareem. "Cybersecurity risk management in agile development: protecting data and system." International Journal of Science and Research Archive 8, no. 1 (February 28, 2023): 988–94. http://dx.doi.org/10.30574/ijsra.2023.8.1.0188.
Повний текст джерелаElendu, Chukwuka, Eunice K. Omeludike, Praise O. Oloyede, Babajide T. Obidigbo, and Janet C. Omeludike. "Legal implications for clinicians in cybersecurity incidents: A review." Medicine 103, no. 39 (September 27, 2024): e39887. http://dx.doi.org/10.1097/md.0000000000039887.
Повний текст джерелаChebib, Tom. "Digital Identity: A Human-Centered Risk Awareness Study." Muma Business Review 5 (2021): 031–33. http://dx.doi.org/10.28945/4826.
Повний текст джерелаMaphosa, Vusumuzi. "An overview of cybersecurity in Zimbabwe’s financial services sector." F1000Research 12 (September 29, 2023): 1251. http://dx.doi.org/10.12688/f1000research.132823.1.
Повний текст джерелаMaphosa, Vusumuzi. "An overview of cybersecurity in Zimbabwe’s financial services sector." F1000Research 12 (March 14, 2024): 1251. http://dx.doi.org/10.12688/f1000research.132823.2.
Повний текст джерелаHenry Nwapali Ndidi Naiho, Oluwabunmi Layode, Gbenga Sheriff Adeleke, Ezekiel Onyekachukwu Udeh, and Talabi Temitope Labake. "Cybersecurity considerations in the implementation of innovative waste management technologies: "A critical review"." Computer Science & IT Research Journal 5, no. 6 (June 14, 2024): 1408–33. http://dx.doi.org/10.51594/csitrj.v5i6.1225.
Повний текст джерелаFleming, Courtney, Mark Reith, and Wayne Henry. "Securing Commercial Satellites for Military Operations: A Cybersecurity Supply Chain Framework." International Conference on Cyber Warfare and Security 18, no. 1 (February 28, 2023): 85–92. http://dx.doi.org/10.34190/iccws.18.1.1062.
Повний текст джерелаKelvin Ovabor, Ismail Oluwatobiloba Sule-Odu, Travis Atkison, Adetutu Temitope Fabusoro, and Joseph Oluwaseun Benedict. "AI-driven threat intelligence for real-time cybersecurity: Frameworks, tools, and future directions." Open Access Research Journal of Science and Technology 12, no. 2 (November 30, 2024): 040–48. http://dx.doi.org/10.53022/oarjst.2024.12.2.0135.
Повний текст джерелаScott, Ben, and Raina Mason. "Cyber as a Second Language? A Challenge to Cybersecurity Education." Journal of The Colloquium for Information Systems Security Education 9, no. 1 (March 8, 2022): 6. http://dx.doi.org/10.53735/cisse.v9i1.137.
Повний текст джерелаOluwatosin Abdul-Azeez, Alexsandra Ogadimma Ihechere, and Courage Idemudia. "Digital access and inclusion for SMEs in the financial services industry through Cybersecurity GRC: A pathway to safer digital ecosystems." Finance & Accounting Research Journal 6, no. 7 (July 7, 2024): 1134–56. http://dx.doi.org/10.51594/farj.v6i7.1270.
Повний текст джерелаBhajekar, Aryan, and Dr Subodhini Gupta. "CYBER SECURITY FOR POWER GRIDS: THREATS, MITIGATION, AND FUTURE OUTLOOK." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 09 (September 23, 2024): 1–4. http://dx.doi.org/10.55041/ijsrem37582.
Повний текст джерелаSavchenko, V., A. Podolieva, O. Olkhovskyi, I. Halona, and O. Aloshyn. "The Transformation of Legal Frameworks Through Secure Digitisation." AFRICAN JOURNAL OF APPLIED RESEARCH 11, no. 1 (January 2, 2025): 173–93. https://doi.org/10.26437/ajar.v11i1.835.
Повний текст джерела