The Role of User Behaviour in Improving Cyber Security Management. [PDF]
Moustafa AA, Bello A, Maurushat A.
europepmc +1 more source
Cyber-Security: Dos Attack Outcomes are Dangerous
M. Mattah Islam +4 more
openalex +2 more sources
Model for successful development and implementation of Cyber Security Operations Centre (SOC). [PDF]
Abd Majid M, Zainol Ariffin KA.
europepmc +1 more source
Using Machine Learning to Achieve Cyber security Requirements: A Comprehensive
Mohammed Alsalamony
openalex +1 more source
Designed-in Security for Cyber-Physical Systems [PDF]
Sean Peisert +4 more
openalex +1 more source
An Internet of Medical Things Cyber Security Assessment Model (IoMT-CySAM). [PDF]
Jaidi F, Ksibi S, Bouhoula A.
europepmc +1 more source
Implementation of international cyber security standards in the national legislation of Ukraine
Ю.В. Деркаченко +2 more
openalex +1 more source
Cyber security Enhancements with reinforcement learning: A zero-day vulnerabilityu identification perspective. [PDF]
Naeem MR +5 more
europepmc +1 more source
CYBER-AIDD: A novel approach to implementing improved cyber security resilience for large Australian healthcare providers using a Unified Modelling Language ontology. [PDF]
Dart M, Ahmed M.
europepmc +1 more source
Design and Analysis of Cyber Security Capability Maturity Model
Mayank Hindka +27 more
openalex +1 more source

