Статті в журналах з теми "Cybersecurity maturity model"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Cybersecurity maturity model".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Kour, Ravdeep, Ramin Karim, and Adithya Thaduri. "Cybersecurity for railways – A maturity model." Proceedings of the Institution of Mechanical Engineers, Part F: Journal of Rail and Rapid Transit 234, no. 10 (October 18, 2019): 1129–48. http://dx.doi.org/10.1177/0954409719881849.
Повний текст джерелаYigit Ozkan, Bilge, Sonny van Lingen, and Marco Spruit. "The Cybersecurity Focus Area Maturity (CYSFAM) Model." Journal of Cybersecurity and Privacy 1, no. 1 (February 13, 2021): 119–39. http://dx.doi.org/10.3390/jcp1010007.
Повний текст джерелаP, Dr Rachana. "Strategic Approaches to Cybersecurity Audits for Control Evaluation." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (December 24, 2024): 1–5. https://doi.org/10.55041/ijsrem40065.
Повний текст джерелаDotsenko, T. V., and M. V. Kuzmenko. "Maturity of the country's cybersecurity system in the conditions of war: assessment trends." Economic Bulletin of Dnipro University of Technology 87 (September 2024): 34–43. http://dx.doi.org/10.33271/ebdut/87.034.
Повний текст джерелаAliyu, Aliyu, Leandros Maglaras, Ying He, Iryna Yevseyeva, Eerke Boiten, Allan Cook, and Helge Janicke. "A Holistic Cybersecurity Maturity Assessment Framework for Higher Education Institutions in the United Kingdom." Applied Sciences 10, no. 10 (May 25, 2020): 3660. http://dx.doi.org/10.3390/app10103660.
Повний текст джерелаPeliukh, O. I., M. V. Yesina, and D. Yu Holubnychyi. "CERT-UA assessment based on the CSIRT ENISA Maturity Model." Radiotekhnika, no. 213 (June 16, 2023): 41–48. http://dx.doi.org/10.30837/rt.2023.2.213.04.
Повний текст джерелаAbdullahi Garba, Adamu, Aliyu Musa Bade, Muktar Yahuza, and Ya’u Nuhu. "Cybersecurity capability maturity models review and application domain." International Journal of Engineering & Technology 9, no. 3 (September 2, 2020): 779. http://dx.doi.org/10.14419/ijet.v9i3.30719.
Повний текст джерелаRazikin, Khairur, and Agus Widodo. "General Cybersecurity Maturity Assessment Model: Best Practice to Achieve Payment Card Industry-Data Security Standard (PCI-DSS) Compliance." CommIT (Communication and Information Technology) Journal 15, no. 2 (August 31, 2021): 91–104. http://dx.doi.org/10.21512/commit.v15i2.6931.
Повний текст джерелаColeman, Joe. "The DOD's CMMC 2.0: What Heat Treaters Need to Know." AM&P Technical Articles 182, no. 2 (March 1, 2024): 37–39. http://dx.doi.org/10.31399/asm.amp.2024-02.p037.
Повний текст джерелаAbhilash Maroju, Srinivas A Vaddadi, Sravanthi Dontu, Rohith Vallabhaneni,. "An Empirical Paradigm on Cybersecurity Vulnerability Mitigation Framework." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9s (August 31, 2023): 786–92. http://dx.doi.org/10.17762/ijritcc.v11i9s.9484.
Повний текст джерелаRoy, Yanina, Olena Riabchun, and Valeriy Yermoshin. "MATURITY MODEL OF CYBER SECURITY SYSTEM OPPORTUNITIES AT CRITICAL INFRASTRUCTURE FACILITIES OF THE ES-C2M2 ENERGY SECTOR." Cybersecurity: Education, Science, Technique 2, no. 10 (2020): 67–74. http://dx.doi.org/10.28925/2663-4023.2020.10.6774.
Повний текст джерелаSabillon, Regner, Juan Ramon Bermejo Higuera, Jeimy Cano, Javier Bermejo Higuera, and Juan Antonio Sicilia Montalvo. "Assessing the Effectiveness of Cyber Domain Controls When Conducting Cybersecurity Audits: Insights from Higher Education Institutions in Canada." Electronics 13, no. 16 (August 16, 2024): 3257. http://dx.doi.org/10.3390/electronics13163257.
Повний текст джерелаDomnik, Jan, and Alexander Holland. "On Data Leakage Prevention Maturity: Adapting the C2M2 Framework." Journal of Cybersecurity and Privacy 4, no. 2 (March 30, 2024): 167–95. http://dx.doi.org/10.3390/jcp4020009.
Повний текст джерелаPatrick, Mayala, Edrick Mugisha, Keneth Mbaga, and Mansour Likamba. "Cybersecurity in Tanzanian Maritime Operations: Exploring Global Best Practices and Their Local Adaptation Using the Cybersecurity Capability Maturity Model (C2M2)." Social Science and Humanities Journal 8, no. 10 (October 26, 2024): 5688–97. http://dx.doi.org/10.18535/sshj.v8i10.1421.
Повний текст джерелаVarona Taborda, María Alejandra. "Dynamic Cybersecurity Model based on ISO standards for Higher Education Institutions in Colombia." Ingeniería Solidaria 17, no. 3 (September 6, 2021): 1–21. http://dx.doi.org/10.16925/2357-6014.2021.03.05.
Повний текст джерелаAlmomani, Iman, Mohanned Ahmed, and Leandros Maglaras. "Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia." PeerJ Computer Science 7 (September 9, 2021): e703. http://dx.doi.org/10.7717/peerj-cs.703.
Повний текст джерелаPigola, Angélica, and Priscila Rezende da Costa. "Dynamic Capabilities in Cybersecurity Intelligence: A Meta-Synthesis to Enhance Protection Against Cyber Threats." Communications of the Association for Information Systems 53, no. 1 (2023): 1099–135. http://dx.doi.org/10.17705/1cais.05347.
Повний текст джерелаUraipan, Naris, Prasong Praneetpolgrang, and Tharini Manisri. "Application of an Analytic Hierarchy Process to Select the Level of a Cyber Resilient Capability Maturity Model in Digital Supply Chain Systems." ECTI Transactions on Computer and Information Technology (ECTI-CIT) 15, no. 2 (April 27, 2021): 198–207. http://dx.doi.org/10.37936/ecti-cit.2021152.240631.
Повний текст джерелаFerreira, Daniel Jorge, and Henrique São Mamede. "Predicting Cybersecurity Risk - A Methodology for Assessments." ARIS2 - Advanced Research on Information Systems Security 2, no. 2 (December 30, 2022): 50–63. http://dx.doi.org/10.56394/aris2.v2i2.23.
Повний текст джерелаMori, Shigeo, and Atsuhiro Goto. "Reviewing National Cybersecurity Strategies." Journal of Disaster Research 13, no. 5 (October 1, 2018): 957–66. http://dx.doi.org/10.20965/jdr.2018.p0957.
Повний текст джерелаBaykız, Tekin, and Şuay Nilhan Açıkalın. "THE DIGITALIZATION OF DIPLOMACY MATURITY MODEL (DD-MM): A NEW MODEL FOR OPTIMIZING DIPLOMATIC DIGITALIZATION." Journal of Nusantara Studies (JONUS) 9, no. 2 (July 31, 2024): 441–73. http://dx.doi.org/10.24200/jonus.vol9iss2pp441-473.
Повний текст джерелаHochstetter-Diez, Jorge, Mauricio Diéguez-Rebolledo, Julio Fenner-López, and Cristina Cachero. "AIM Triad: A Prioritization Strategy for Public Institutions to Improve Information Security Maturity." Applied Sciences 13, no. 14 (July 19, 2023): 8339. http://dx.doi.org/10.3390/app13148339.
Повний текст джерелаFleming, Courtney, Mark Reith, and Wayne Henry. "Securing Commercial Satellites for Military Operations: A Cybersecurity Supply Chain Framework." International Conference on Cyber Warfare and Security 18, no. 1 (February 28, 2023): 85–92. http://dx.doi.org/10.34190/iccws.18.1.1062.
Повний текст джерелаLevy, Yair, and Ruti Gafni. "Towards the quantification of cybersecurity footprint for SMBs using the CMMC 2.0." Online Journal of Applied Knowledge Management 10, no. 1 (September 6, 2022): 43–61. http://dx.doi.org/10.36965/ojakm.2022.10(1)43-61.
Повний текст джерелаTabim, Verônica Maurer, Cíntia Wilke Franco, and João Pedro Hoerde. "Digital transformation in e-commerce logistics." Brazilian Journal of Operations & Production Management 21, no. 1 (March 2, 2024): 1641. http://dx.doi.org/10.14488/bjopm.1641.2024.
Повний текст джерелаAmanda, Delpia, Nurul Mutiah, and Syahru Rahmayudha. "Analisis Tingkat Kematangan Keamanan Informasi Menggunakan NIST Cybersecurity Framework dan CMMI." Coding Jurnal Komputer dan Aplikasi 11, no. 2 (September 1, 2023): 291. http://dx.doi.org/10.26418/coding.v11i2.65088.
Повний текст джерелаFajri, Khafidh Sunny Al, and Ruki Harwahyu. "Information Security Management System Assessment Model by Integrating ISO 27002 and 27004." MALCOM: Indonesian Journal of Machine Learning and Computer Science 4, no. 2 (February 24, 2024): 498–506. http://dx.doi.org/10.57152/malcom.v4i2.1245.
Повний текст джерелаKvint, V. L., A. V. Babkin, and E. V. Shkarupeta. "Strategizing of forming a platform operating model to increase the level of digital maturity of industrial systems." Russian Journal of Industrial Economics 15, no. 3 (October 8, 2022): 249–61. http://dx.doi.org/10.17073/2072-1633-2022-3-249-261.
Повний текст джерелаMuttaqin, Hidayatul, and Kalamullah Ramli. "Designing An Information Security Framework For The Indonesia Water Industry Sector." Cakrawala Repositori IMWI 6, no. 3 (July 7, 2023): 771–80. http://dx.doi.org/10.52851/cakrawala.v6i3.352.
Повний текст джерелаTolkachov, Maksym, Nataliia Dzheniuk, Serhii Yevseiev, Yurii Lysetskyi, Volodymyr Shulha, Ivan Grod, Serhii Faraon, Ihor Ivanchenko, Igor Pasko, and Dmytro Balagura. "Development of a method for protecting information resources in a corporate network by segmenting traffic." Eastern-European Journal of Enterprise Technologies 5, no. 9 (131) (October 23, 2024): 63–78. http://dx.doi.org/10.15587/1729-4061.2024.313158.
Повний текст джерелаGarba, Adamu Abdullahi, Maheyzah Muhamad Siraj, and Siti Hajar Othman. "An Explanatory Review on Cybersecurity Capability Maturity Models." Advances in Science, Technology and Engineering Systems Journal 5, no. 4 (2020): 762–69. http://dx.doi.org/10.25046/aj050490.
Повний текст джерелаMiron, Walter, and Kevin Muita. "Cybersecurity Capability Maturity Models for Providers of Critical Infrastructure." Technology Innovation Management Review 4, no. 10 (October 30, 2014): 33–39. http://dx.doi.org/10.22215/timreview/837.
Повний текст джерелаMiron, Walter, and Kevin Muita. "Cybersecurity Capability Maturity Models for Providers of Critical Infrastructure." Technology Innovation Management Review 4, no. 10 (October 30, 2014): 33–39. http://dx.doi.org/10.22215/timreview837.
Повний текст джерелаKolomiyets, Ganna M., and Maryna O. Moskalenko. "Confidence-Building Challenges in e-Commerce." Business Inform 8, no. 559 (2024): 224–30. http://dx.doi.org/10.32983/2222-4459-2024-8-224-230.
Повний текст джерелаPayette, Jay, Esther Anegbe, Erika Caceres, and Steven Muegge. "Secure by Design: Cybersecurity Extensions to Project Management Maturity Models for Critical Infrastructure Projects." Technology Innovation Management Review 5, no. 6 (June 26, 2015): 26–34. http://dx.doi.org/10.22215/timreview/904.
Повний текст джерелаPayette, Jay, Esther Anegbe, Erika Caceres, and Steven Muegge. "Secure by Design: Cybersecurity Extensions to Project Management Maturity Models for Critical Infrastructure Projects." Technology Innovation Management Review 5, no. 6 (June 26, 2015): 26–34. http://dx.doi.org/10.22215/timreview904.
Повний текст джерелаKoolen, Christof, Kim Wuyts, Wouter Joosen, and Peggy Valcke. "From insight to compliance: Appropriate technical and organisational security measures through the lens of cybersecurity maturity models." Computer Law & Security Review 52 (April 2024): 105914. http://dx.doi.org/10.1016/j.clsr.2023.105914.
Повний текст джерелаKour, Ravdeep, and Ramin Karim. "Cybersecurity workforce in railway: its maturity and awareness." Journal of Quality in Maintenance Engineering ahead-of-print, ahead-of-print (December 18, 2020). http://dx.doi.org/10.1108/jqme-07-2020-0059.
Повний текст джерелаBaikloy, Ekkachat, Prasong Praneetpolgrang, and Nivet Jirawichitchai. "Development of Cyber Resilient Capability Maturity Model for Cloud Computing Services." TEM Journal, August 27, 2020, 915–23. http://dx.doi.org/10.18421/tem93-11.
Повний текст джерела(GCSCC), Global Cyber Security Capacity Cent. "Cybersecurity Capacity Maturity Model for Nations (CMM) 2021 Edition." SSRN Electronic Journal, 2021. http://dx.doi.org/10.2139/ssrn.3822153.
Повний текст джерела(GCSCC), Global Cyber Security Capacity Cent. "Cybersecurity Capacity Maturity Model for Nations (CMM) Revised Edition." SSRN Electronic Journal, 2016. http://dx.doi.org/10.2139/ssrn.3657116.
Повний текст джерелаLee, GangSeok, SuHyun Kim, ImYoung Lee, Suzana Brown, and Yuri Aldoradin Carbajal. "Adapting cybersecurity maturity models for resource‐constrained settings: A case study of Peru." ELECTRONIC JOURNAL OF INFORMATION SYSTEMS IN DEVELOPING COUNTRIES, October 22, 2024. http://dx.doi.org/10.1002/isd2.12350.
Повний текст джерелаTabansky, Lior, and Eynan Lichterman. "PROGRESS: the sectoral approach to cyber resilience." International Journal of Information Security 24, no. 1 (November 7, 2024). http://dx.doi.org/10.1007/s10207-024-00910-3.
Повний текст джерелаKulugh, Victor Emmanuel, Uche M. Mbanaso, and Gloria Chukwudebe. "Cybersecurity Resilience Maturity Assessment Model for Critical National Information Infrastructure." SN Computer Science 3, no. 3 (April 10, 2022). http://dx.doi.org/10.1007/s42979-022-01108-x.
Повний текст джерелаJ.D., Rafael Dean Brown. "Towards a Qatar Cybersecurity Capability Maturity Model with a Legislative Framework." International Review of Law 2018, no. 4 (December 1, 2019). http://dx.doi.org/10.29117/irl.2018.0036.
Повний текст джерелаSkarga-Bandurova, Inna, Igor Kotsiuba, and Erkuden Rios Velasco. "Cyber Hygiene Maturity Assessment Framework for Smart Grid Scenarios." Frontiers in Computer Science 3 (March 10, 2021). http://dx.doi.org/10.3389/fcomp.2021.614337.
Повний текст джерелаVance, David, Mingzhou Jin, Christopher Price, Sachin U. Nimbalkar, and Thomas Wenning. "Smart manufacturing maturity models and their applicability: a review." Journal of Manufacturing Technology Management, April 26, 2023. http://dx.doi.org/10.1108/jmtm-03-2022-0103.
Повний текст джерела"INTEGRATING CYBERSECURITY MATURITY: A HYBRID MODEL FOR BOTH TRADITIONAL ENVIRONMENT AND CLOUD ENVIRONMENT." International Research Journal of Modernization in Engineering Technology and Science, December 24, 2023. http://dx.doi.org/10.56726/irjmets47210.
Повний текст джерелаAlshammari, Fahad H. "Design of capability maturity model integration with cybersecurity risk severity complex prediction using bayesian-based machine learning models." Service Oriented Computing and Applications, November 15, 2022. http://dx.doi.org/10.1007/s11761-022-00354-4.
Повний текст джерелаHedberg, David, Martin Lundgren, and Marcus Nohlberg. "Cybersecurity in modern cars: awareness and readiness of auto workshops." Information & Computer Security, February 1, 2024. http://dx.doi.org/10.1108/ics-11-2023-0211.
Повний текст джерела