DIKUL - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UL. For full access, REGISTER.

1 2 3 4 5
hits: 442,921
1.
  • Correlating human traits an... Correlating human traits and cyber security behavior intentions
    Gratian, Margaret; Bandi, Sruthi; Cukier, Michel ... Computers & security, 03/2018, Volume: 73
    Journal Article
    Peer reviewed
    Open access

    In this paper, we correlate human characteristics with cyber security behavior intentions. While previous papers have identified correlations between certain human traits and specific cyber security ...
Full text
Available for: UL
2.
  • A Survey on State Estimatio... A Survey on State Estimation Techniques and Challenges in Smart Distribution Systems
    Dehghanpour, Kaveh; Wang, Zhaoyu; Wang, Jianhui ... IEEE transactions on smart grid, 03/2019, Volume: 10, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    This paper presents a review of the literature on state estimation (SE) in power systems. While covering works related to SE in transmission systems, the main focus of this paper is distribution ...
Full text
Available for: UL

PDF
3.
  • Don't Wanna Cry: A Cyber Cr... Don't Wanna Cry: A Cyber Crisis Table Top Exercise for Assessing the Preparedness against Eminent Threats
    Bahuguna, Ashutosh; Bisht, Raj Kishore; Pande, Jeetendra International journal of engineering and advanced technology, 10/2019, Volume: 9, Issue: 1
    Journal Article
    Open access

    Cyber Security Exercises are emerged as useful tool for assessing and improving preparedness of the organizations and nations against cyber threats. Cyber security exercises of different types & ...
Full text
Available for: UL

PDF
4.
  • Decision-Makers’ Understand... Decision-Makers’ Understanding of Cyber-Security’s Systemic and Dynamic Complexity: Insights from a Board Game for Bank Managers
    Zeijlemaker, Sander; Rouwette, Etiënne A. J. A.; Cunico, Giovanni ... Systems (Basel), 04/2022, Volume: 10, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    Cyber-security incidents show how difficult it is to make optimal strategic decisions in such a complex environment. Given that it is hard for researchers to observe organisations’ decision-making ...
Full text
Available for: UL
5.
  • From information security t... From information security to cyber security
    von Solms, Rossouw; van Niekerk, Johan Computers & security, 10/2013, Volume: 38
    Journal Article
    Peer reviewed

    The term cyber security is often used interchangeably with the term information security. This paper argues that, although there is a substantial overlap between cyber security and information ...
Full text
Available for: UL
6.
  • Factors Related to Cyber Se... Factors Related to Cyber Security Behavior
    Kovacevic, Ana; Putnik, Nenad; Toskovic, Oliver IEEE access, 2020, Volume: 8
    Journal Article
    Peer reviewed
    Open access

    Theoretical and empirical insight notes that cyber security awareness is a topic of particular interest in cyber security. Humans are the central figures in cyber security and the way to reduce risk ...
Full text
Available for: UL

PDF
7.
  • Detecting and Preventing Cyber Insider Threats: A Survey
    Liu Liu; De Vel, Olivier; Qing-Long Han ... IEEE Communications surveys and tutorials, 01/2018, Volume: 20, Issue: 2
    Journal Article
    Peer reviewed

    Information communications technology systems are facing an increasing number of cyber security threats, the majority of which are originated by insiders. As insiders reside behind the ...
Full text
Available for: UL
8.
  • Cyber security in the age o... Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic
    Lallie, Harjinder Singh; Shepherd, Lynsay A.; Nurse, Jason R.C. ... Computers & security, June 2021, 2021-Jun, 2021-06-00, 20210601, Volume: 105
    Journal Article
    Peer reviewed
    Open access

    The COVID-19 pandemic was a remarkable, unprecedented event which altered the lives of billions of citizens globally resulting in what became commonly referred to as the new-normal in terms of ...
Full text
Available for: UL

PDF
9.
  • Intelligent Electronic Devi... Intelligent Electronic Devices With Collaborative Intrusion Detection Systems
    Hong, Junho; Liu, Chen-Ching IEEE transactions on smart grid, 2019-Jan., 2019-1-00, 20190101, Volume: 10, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    This paper proposes the new concept of intelligent electronic devices (IEDs) with built-in distributed intrusion detection systems. The proposed IEDs have the capabilities to monitor and detect ...
Full text
Available for: UL

PDF
10.
  • Adversarial Machine Learnin... Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain
    Rosenberg, Ishai; Shabtai, Asaf; Elovici, Yuval ... ACM computing surveys, 06/2021, Volume: 54, Issue: 5
    Journal Article
    Peer reviewed
    Open access

    In recent years, machine learning algorithms, and more specifically deep learning algorithms, have been widely used in many fields, including cyber security. However, machine learning systems are ...
Full text
Available for: UL

PDF
1 2 3 4 5
hits: 442,921

Load filters