UNI-MB - logo
UMNIK - logo
 

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UM. For full access, REGISTER.

1 2 3 4 5
hits: 67,152
1.
  • Correlating human traits an... Correlating human traits and cyber security behavior intentions
    Gratian, Margaret; Bandi, Sruthi; Cukier, Michel ... Computers & security, 03/2018, Volume: 73
    Journal Article
    Peer reviewed
    Open access

    In this paper, we correlate human characteristics with cyber security behavior intentions. While previous papers have identified correlations between certain human traits and specific cyber security ...
Full text
2.
  • A Survey on State Estimatio... A Survey on State Estimation Techniques and Challenges in Smart Distribution Systems
    Dehghanpour, Kaveh; Wang, Zhaoyu; Wang, Jianhui ... IEEE transactions on smart grid, 03/2019, Volume: 10, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    This paper presents a review of the literature on state estimation (SE) in power systems. While covering works related to SE in transmission systems, the main focus of this paper is distribution ...
Full text

PDF
3.
  • Don't Wanna Cry: A Cyber Cr... Don't Wanna Cry: A Cyber Crisis Table Top Exercise for Assessing the Preparedness against Eminent Threats
    Bahuguna, Ashutosh; Bisht, Raj Kishore; Pande, Jeetendra International journal of engineering and advanced technology, 10/2019, Volume: 9, Issue: 1
    Journal Article
    Open access

    Cyber Security Exercises are emerged as useful tool for assessing and improving preparedness of the organizations and nations against cyber threats. Cyber security exercises of different types & ...
Full text

PDF
4.
  • Decision-Makers’ Understand... Decision-Makers’ Understanding of Cyber-Security’s Systemic and Dynamic Complexity: Insights from a Board Game for Bank Managers
    Zeijlemaker, Sander; Rouwette, Etiënne A. J. A.; Cunico, Giovanni ... Systems (Basel), 04/2022, Volume: 10, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    Cyber-security incidents show how difficult it is to make optimal strategic decisions in such a complex environment. Given that it is hard for researchers to observe organisations’ decision-making ...
Full text
5.
  • From information security t... From information security to cyber security
    von Solms, Rossouw; van Niekerk, Johan Computers & security, 10/2013, Volume: 38
    Journal Article
    Peer reviewed

    The term cyber security is often used interchangeably with the term information security. This paper argues that, although there is a substantial overlap between cyber security and information ...
Full text
6.
  • A survey on sliding mode co... A survey on sliding mode control for networked control systems
    Hu, Jun; Zhang, Hongxu; Liu, Hongjian ... International journal of systems science, 04/2021, Volume: 52, Issue: 6
    Journal Article
    Peer reviewed

    In the framework of the networked control systems (NCSs), the components are connected with each other over a shared band-limited network. The merits of NCSs include easy extensibility, resource ...
Full text
7.
  • Factors Related to Cyber Se... Factors Related to Cyber Security Behavior
    Kovacevic, Ana; Putnik, Nenad; Toskovic, Oliver IEEE access, 2020, Volume: 8
    Journal Article
    Peer reviewed
    Open access

    Theoretical and empirical insight notes that cyber security awareness is a topic of particular interest in cyber security. Humans are the central figures in cyber security and the way to reduce risk ...
Full text

PDF
8.
  • Detecting and Preventing Cy... Detecting and Preventing Cyber Insider Threats: A Survey
    Liu Liu; De Vel, Olivier; Qing-Long Han ... IEEE Communications surveys and tutorials, 01/2018, Volume: 20, Issue: 2
    Journal Article
    Peer reviewed

    Information communications technology systems are facing an increasing number of cyber security threats, the majority of which are originated by insiders. As insiders reside behind the ...
Full text
9.
  • Cyber security in the age o... Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic
    Lallie, Harjinder Singh; Shepherd, Lynsay A.; Nurse, Jason R.C. ... Computers & security, June 2021, 2021-Jun, 2021-06-00, 20210601, Volume: 105
    Journal Article
    Peer reviewed
    Open access

    The COVID-19 pandemic was a remarkable, unprecedented event which altered the lives of billions of citizens globally resulting in what became commonly referred to as the new-normal in terms of ...
Full text

PDF
10.
  • Intelligent Electronic Devi... Intelligent Electronic Devices With Collaborative Intrusion Detection Systems
    Hong, Junho; Liu, Chen-Ching IEEE transactions on smart grid, 2019-Jan., 2019-1-00, 20190101, Volume: 10, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    This paper proposes the new concept of intelligent electronic devices (IEDs) with built-in distributed intrusion detection systems. The proposed IEDs have the capabilities to monitor and detect ...
Full text

PDF
1 2 3 4 5
hits: 67,152

Load filters