UP - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UPUK. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 16.002
21.
  • Finding the weakest links i... Finding the weakest links in the weakest link: How well do undergraduate students make cybersecurity judgment?
    Yan, Zheng; Robertson, Thomas; Yan, River ... Computers in human behavior, July 2018, 2018-07-00, 20180701, Letnik: 84
    Journal Article
    Recenzirano

    It has been widely recognized in the psychology of cybersecurity literature that ordinary users rather than technology systems are the weakest link in cybersecurity. The present study focused on ...
Celotno besedilo
22.
Celotno besedilo
23.
Celotno besedilo
24.
Celotno besedilo
25.
  • Risk and protective factors... Risk and protective factors for intuitive and rational judgment of cybersecurity risks in a large sample of K-12 students and teachers
    Yan, Zheng; Xue, Yukang; Lou, Yaosheng Computers in human behavior, August 2021, 2021-08-00, 20210801, Letnik: 121
    Journal Article
    Recenzirano
    Odprti dostop

    K-12 students and teachers are a vulnerable population for cybersecurity risks. Identifying both risk factors and protective factors associated with intuitive and rational judgment of cybersecurity ...
Celotno besedilo

PDF
26.
  • Cybersecurity Protection fo... Cybersecurity Protection for PACS and Medical Imaging: Deployment Considerations and Practical Problems
    Eichelberg, Marco; Kleber, Klaus; Kämmerer, Marc Academic radiology, December 2021, Letnik: 28, Številka: 12
    Journal Article
    Recenzirano
    Odprti dostop

    Cybersecurity is increasingly affecting the healthcare sector. In a recent article, the authors analyzed specific attacks against picture archiving and communications systems (PACS) and medical ...
Celotno besedilo

PDF
27.
Celotno besedilo
28.
  • Cybersecurity vulnerability... Cybersecurity vulnerability mitigation framework through empirical paradigm: Enhanced prioritized gap analysis
    Gourisetti, Sri Nikhil Gupta; Mylrea, Michael; Patangia, Hirak Future generation computer systems, April 2020, 2020-04-00, Letnik: 105
    Journal Article
    Recenzirano

    Existing cybersecurity vulnerability assessment tools were designed based on the policies and standards defined by organizations such as the U.S. Department of Energy and the National Institute of ...
Celotno besedilo
29.
  • The Disclosures of Informat... The Disclosures of Information on Cybersecurity in Listed Companies in Latin America—Proposal for a Cybersecurity Disclosure Index
    Ramírez, Maricela; Rodríguez Ariza, Lázaro; Gómez Miranda, María Elena ... Sustainability, 02/2022, Letnik: 14, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    For the corporate sphere, cybersecurity becomes an inescapable business responsibility, and accountability becomes a way of providing trust and ensuring resilience against cyber risks and high-impact ...
Celotno besedilo

PDF
30.
  • A Generalized False Data In... A Generalized False Data Injection Attacks Against Power System Nonlinear State Estimator and Countermeasures
    Zhao, Junbo; Mili, Lamine; Wang, Meng IEEE transactions on power systems, 2018-Sept., 2018-9-00, 20180901, Letnik: 33, Številka: 5
    Journal Article
    Recenzirano

    This paper develops a generalized framework that allows us to investigate the vulnerability of the power system nonlinear state estimator to false data injection attacks (FDIAs) from the operator's ...
Celotno besedilo
1 2 3 4 5
zadetkov: 16.002

Nalaganje filtrov