Results 1 to 10 of about 104,319 (136)

A Survey on Cyber Security for Smart Grid Communications [PDF]

open access: yesIEEE Communications Surveys and Tutorials, 2012
A smart grid is a new form of electricity network with high fidelity power-flow control, self-healing, and energy reliability and energy security using digital communications and control technology. To upgrade an existing power grid into a smart grid, it
Yi Qian, Hamid Sharif, David Tipper
exaly   +3 more sources

Cyber security education is as essential as "the three R's". [PDF]

open access: yesHeliyon, 2019
Smartphones have diffused rapidly across South African society and constitute the most dominant information and communication technologies in everyday use.
Venter IM   +3 more
europepmc   +5 more sources

CYBER SECURITY

open access: yesINTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT, 2023
"Cyber security has become a critical concern for individuals, businesses, and governments around the world. With the increasing reliance on technology and the internet, cyber attacks and data breaches have become more frequent and sophisticated. In this article, we examine the current state of cyber security and the most common types of cyber threats,
Vinisha Bhagwani, Sakina Balasinorwala
  +5 more sources

Cyber Security

open access: yesInternational Research Journal of Modernization in Engineering Technology and Science
This book offers a multifaceted exploration of cybersecurity through the lenses of policy, ethics, and advanced technology. It examines the complex interplay of law, diplomacy, and geopolitics in the digital age, emphasizing the protection of critical infrastructure and the impact of international conflict on global security.
Lehto Martti, Neittaanmäki Pekka
  +9 more sources

Governing cyber security through networks : an analysis of cyber security coordination in Belgium [PDF]

open access: yes, 2015
While governments develop formal and informal structures or 'networks' to promote collaboration between governmental departments and agencies, there remains uncertainty on how to set up and develop cyber security networks. The latter is demonstrated when
Rondelez, Rafaël
core   +3 more sources

European Cyber Security System [PDF]

open access: yes, 2017
Nowadays computer networks are widely spread in all spheres of human life. That is why the problem of cyber security of mankind is of great importance. Today, the European Union makes efforts to guarantee network safety in Europe by means of increase ...
Kolodiy, Yegor   +2 more
core   +2 more sources

Cyber security fear appeals:unexpectedly complicated [PDF]

open access: yes, 2020
Cyber security researchers are starting to experiment with fear appeals, with a wide variety of designs and reported efficaciousness. This makes it hard to derive recommendations for designing and deploying these interventions. We thus reviewed the wider
Albayram Y.   +39 more
core   +2 more sources

Cyber security and the Leviathan

open access: yesComputers & Security, 2022
Dedicated cyber-security functions are common in commercial businesses, who are confronted by evolving and pervasive threats of data breaches and other perilous security events. Such businesses are enmeshed with the wider societies in which they operate.
openaire   +2 more sources

ECONOMIC AND CYBER SECURITY

open access: yes, 2023
Collective monograph highlights the results of systematic scientific research devoted to the problems of economic cyber security as a component of the financial security of the state, and contains practical recommendations on measures to strengthen the security of the state, in particular strategically important enterprises, in the presence of modern ...
Victor Krasnobayev   +26 more
openaire   +3 more sources

How does intellectual capital align with cyber security? [PDF]

open access: yes, 2019
Purpose – To position the preservation and protection of intellectual capital as a cyber security concern. We outline the security requirements of intellectual capital to help Boards of Directors and executive management teams to understand their ...
Renaud, Karen   +2 more
core   +3 more sources

Home - About - Disclaimer - Privacy