NUK - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov NUK. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 444.878
1.
  • Correlating human traits an... Correlating human traits and cyber security behavior intentions
    Gratian, Margaret; Bandi, Sruthi; Cukier, Michel ... Computers & security, 03/2018, Letnik: 73
    Journal Article
    Recenzirano
    Odprti dostop

    In this paper, we correlate human characteristics with cyber security behavior intentions. While previous papers have identified correlations between certain human traits and specific cyber security ...
Celotno besedilo
2.
  • A Survey on State Estimatio... A Survey on State Estimation Techniques and Challenges in Smart Distribution Systems
    Dehghanpour, Kaveh; Wang, Zhaoyu; Wang, Jianhui ... IEEE transactions on smart grid, 03/2019, Letnik: 10, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    This paper presents a review of the literature on state estimation (SE) in power systems. While covering works related to SE in transmission systems, the main focus of this paper is distribution ...
Celotno besedilo

PDF
3.
  • Don't Wanna Cry: A Cyber Cr... Don't Wanna Cry: A Cyber Crisis Table Top Exercise for Assessing the Preparedness against Eminent Threats
    Bahuguna, Ashutosh; Bisht, Raj Kishore; Pande, Jeetendra International journal of engineering and advanced technology, 10/2019, Letnik: 9, Številka: 1
    Journal Article
    Odprti dostop

    Cyber Security Exercises are emerged as useful tool for assessing and improving preparedness of the organizations and nations against cyber threats. Cyber security exercises of different types & ...
Celotno besedilo

PDF
4.
  • Decision-Makers’ Understand... Decision-Makers’ Understanding of Cyber-Security’s Systemic and Dynamic Complexity: Insights from a Board Game for Bank Managers
    Zeijlemaker, Sander; Rouwette, Etiënne A. J. A.; Cunico, Giovanni ... Systems, 04/2022, Letnik: 10, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    Cyber-security incidents show how difficult it is to make optimal strategic decisions in such a complex environment. Given that it is hard for researchers to observe organisations’ decision-making ...
Celotno besedilo
5.
  • From information security t... From information security to cyber security
    von Solms, Rossouw; van Niekerk, Johan Computers & security, 10/2013, Letnik: 38
    Journal Article
    Recenzirano

    The term cyber security is often used interchangeably with the term information security. This paper argues that, although there is a substantial overlap between cyber security and information ...
Celotno besedilo
6.
  • A survey on sliding mode co... A survey on sliding mode control for networked control systems
    Hu, Jun; Zhang, Hongxu; Liu, Hongjian ... International journal of systems science, 04/2021, Letnik: 52, Številka: 6
    Journal Article
    Recenzirano

    In the framework of the networked control systems (NCSs), the components are connected with each other over a shared band-limited network. The merits of NCSs include easy extensibility, resource ...
Celotno besedilo
7.
  • Factors Related to Cyber Se... Factors Related to Cyber Security Behavior
    Kovacevic, Ana; Putnik, Nenad; Toskovic, Oliver IEEE access, 2020, Letnik: 8
    Journal Article
    Recenzirano
    Odprti dostop

    Theoretical and empirical insight notes that cyber security awareness is a topic of particular interest in cyber security. Humans are the central figures in cyber security and the way to reduce risk ...
Celotno besedilo

PDF
8.
  • Detecting and Preventing Cyber Insider Threats: A Survey
    Liu Liu; De Vel, Olivier; Qing-Long Han ... IEEE Communications surveys and tutorials, 01/2018, Letnik: 20, Številka: 2
    Journal Article
    Recenzirano

    Information communications technology systems are facing an increasing number of cyber security threats, the majority of which are originated by insiders. As insiders reside behind the ...
Celotno besedilo
9.
  • Cyber security in the age o... Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic
    Lallie, Harjinder Singh; Shepherd, Lynsay A.; Nurse, Jason R.C. ... Computers & security, June 2021, 2021-Jun, 2021-06-00, 20210601, Letnik: 105
    Journal Article
    Recenzirano
    Odprti dostop

    The COVID-19 pandemic was a remarkable, unprecedented event which altered the lives of billions of citizens globally resulting in what became commonly referred to as the new-normal in terms of ...
Celotno besedilo

PDF
10.
  • Intelligent Electronic Devi... Intelligent Electronic Devices With Collaborative Intrusion Detection Systems
    Hong, Junho; Liu, Chen-Ching IEEE transactions on smart grid, 2019-Jan., 2019-1-00, 20190101, Letnik: 10, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    This paper proposes the new concept of intelligent electronic devices (IEDs) with built-in distributed intrusion detection systems. The proposed IEDs have the capabilities to monitor and detect ...
Celotno besedilo

PDF
1 2 3 4 5
zadetkov: 444.878

Nalaganje filtrov