UP - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UPUK. Za polni dostop se PRIJAVITE.

3 4 5 6 7
zadetkov: 58.960
41.
  • A review of cyber security ... A review of cyber security risk assessment methods for SCADA systems
    Cherdantseva, Yulia; Burnap, Pete; Blyth, Andrew ... Computers & security, February 2016, 2016-02-00, 20160201, Letnik: 56
    Journal Article
    Recenzirano
    Odprti dostop

    This paper reviews the state of the art in cyber security risk assessment of Supervisory Control and Data Acquisition (SCADA) systems. We select and in-detail examine twenty-four risk assessment ...
Celotno besedilo

PDF
42.
  • Calculated risk? A cybersec... Calculated risk? A cybersecurity evaluation tool for SMEs
    Benz, Michael; Chatterjee, Dave Business horizons, July-August 2020, 2020-07-00, Letnik: 63, Številka: 4
    Journal Article
    Recenzirano

    Small and medium-sized enterprises (SMEs) are among the least mature and most vulnerable in terms of their cybersecurity risk and resilience. In this article, we describe a methodology developed ...
Celotno besedilo
43.
  • M-ISDS: A Mobilized Intrusi... M-ISDS: A Mobilized Intrusion and Spam Detection System
    Li, Yuyang SHS Web of Conferences, 2022, Letnik: 144
    Journal Article, Conference Proceeding
    Recenzirano
    Odprti dostop

    As the world strides into the digital world, cybersecurity has become an indispensable part of connected devices. Although we have developed cybersecurity measures that can effectively defend against ...
Celotno besedilo
44.
Celotno besedilo

PDF
45.
  • Optimism amid risk: How non... Optimism amid risk: How non-IT employees’ beliefs affect cybersecurity behavior
    Fatoki, Jimoh G.; Shen, Zixing; Mora-Monge, Carlo A. Computers & security, June 2024, 2024-06-00, Letnik: 141
    Journal Article
    Recenzirano

    This study delves into the interplay between personal dispositions and cybersecurity behaviors within organizational settings. It investigates how optimism bias influences attitudes toward ...
Celotno besedilo
46.
Celotno besedilo

PDF
47.
  • Experts’ feedback on the cy... Experts’ feedback on the cybersecurity footprint elements: in pursuit of a quantifiable measure of SMBs’ cybersecurity posture
    Gafni, Ruti; Levy, Yair Information and computer security, 11/2023, Letnik: 31, Številka: 5
    Journal Article
    Recenzirano

    Purpose While data breaches are reported daily, organizations are struggling with quantifying their cybersecurity posture. This paper aims to introduce the Universal Cybersecurity Footprint Index ...
Celotno besedilo
48.
  • Does cybersecurity maturity... Does cybersecurity maturity level assurance improve cybersecurity risk management in supply chains?
    Song, Ju Myung; Wang, Tawei; Yen, Ju-Chun ... International journal of accounting information systems, September 2024, 2024-09-00, Letnik: 54
    Journal Article
    Recenzirano

    •We examine whether a buyer’s strategic arrangement of establishing targeted cybersecurity requisites for its potential suppliers is effective and beneficial.•Requiring cybersecurity assurance might ...
Celotno besedilo
49.
  • The future of Artificial In... The future of Artificial Intelligence in Cybersecurity: A Comprehensive Survey
    Tao, Feng; Akhtar, Muhammad; Jiayuan, Zhang EAI endorsed transactions on creative technologies, 08/2021, Letnik: 8, Številka: 28
    Journal Article
    Recenzirano
    Odprti dostop

    AI in Cybersecurity Market scheme helps organizations in observance, detecting, reporting, and countering cyber threats to keep up information confidentiality. The increasing awareness among folks, ...
Celotno besedilo

PDF
50.
  • Cyber Attack Resilient Dist... Cyber Attack Resilient Distance Protection and Circuit Breaker Control for Digital Substations
    Hong, Junho; Nuqui, Reynaldo F.; Kondabathini, Anil ... IEEE transactions on industrial informatics, 07/2019, Letnik: 15, Številka: 7
    Journal Article
    Odprti dostop

    This paper proposes new concepts for detecting and mitigating cyber attacks on substation automation systems by domain-based cyber-physical security solutions. The proposed methods form the basis of ...
Celotno besedilo

PDF
3 4 5 6 7
zadetkov: 58.960

Nalaganje filtrov