Results 31 to 40 of about 44,516 (50)

CYBERSECURITY IN THE FINANCIAL SECTOR: A COMPARATIVE ANALYSIS OF THE USA AND NIGERIA

open access: yesComputer Science & IT Research Journal
This paper provides a comprehensive review and comparative analysis of cybersecurity challenges and strategies within the financial sectors of the United States of America (USA) and Nigeria.
Babajide Tolulope Familoni   +1 more
semanticscholar   +1 more source

A REVIEW OF CYBERSECURITY STRATEGIES IN MODERN ORGANIZATIONS: EXAMINING THE EVOLUTION AND EFFECTIVENESS OF CYBERSECURITY MEASURES FOR DATA PROTECTION

open access: yesComputer Science & IT Research Journal
In an era where digital threats are increasingly pervasive, understanding the evolution and efficacy of cybersecurity strategies in modern organizations is paramount. This study provides a comprehensive analysis of the dynamic landscape of cybersecurity,
Temitayo Oluwaseun Abrahams   +4 more
semanticscholar   +1 more source

Cybersecurity risks in online banking: A detailed review and preventive strategies applicatio

open access: yesWorld Journal of Advanced Research and Reviews
In an era where the digital transformation of the banking sector intersects with the escalating complexity of cyber threats, this paper endeavors to dissect the multifaceted realm of cybersecurity within the banking industry.
A. Oyewole   +3 more
semanticscholar   +1 more source

Artificial intelligence for cybersecurity: Literature review and future research directions

open access: yesInformation Fusion, 2023
Ramanpreet Kaur   +2 more
semanticscholar   +1 more source

Cybersecurity’s Role in Environmental Protection and Sustainable Development: Bridging Technology and Sustainability Goals

open access: yesComputer Science & IT Research Journal
This study investigates the pivotal role of cybersecurity in bolstering environmental protection and sustainable development, a critical yet underexplored nexus in contemporary research.
Scholar Chinenye Obasi   +3 more
semanticscholar   +1 more source

CYBERSECURITY AWARENESS AND EDUCATION PROGRAMS: A REVIEW OF EMPLOYEE ENGAGEMENT AND ACCOUNTABILITY

open access: yesComputer Science & IT Research Journal
As organizations continue to grapple with the escalating threat landscape of cyber-attacks, the imperative to fortify their cybersecurity defenses becomes increasingly paramount.
Temitayo Oluwaseun Abrahams   +5 more
semanticscholar   +1 more source

Cybersecurity for Sustainable Smart Healthcare: State of the Art, Taxonomy, Mechanisms, and Essential Roles

open access: yesMesopotamian Journal of CyberSecurity
Cutting-edge technologies have been widely employed in healthcare delivery, resulting in transformative advances and promising enhanced patient care, operational efficiency, and resource usage.
Guma Ali, Maad M. Mijwil
semanticscholar   +1 more source

More than malware: unmasking the hidden risk of cybersecurity regulations

open access: yesInternational Cybersecurity Law Review
Cybersecurity investments are made within a complex and ever-evolving environment, where regulatory changes represent a significant risk factor. While cybersecurity regulations aim to minimize cyber risks and enhance protection, the uncertainty arising ...
Mazaher Kianpour, Shahid Raza
semanticscholar   +1 more source
Some of the next articles are maybe not open access.

Related searches:

Cybersecurity of Smart Inverters in the Smart Grid: A Survey

IEEE transactions on power electronics, 2023
The penetration of distributed energy resources (DERs) in smart grids significantly increases the number of field devices owned and controlled by consumers, aggregators, third parties, and utilities.
Yuanliang Li, Jun Yan
semanticscholar   +1 more source

Cybersecurity Threats Detection in Intelligent Networks using Predictive Analytics Approaches

2024 4th International Conference on Innovative Practices in Technology and Management (ICIPTM)
The modern scenario of network vulnerabilities necessitates the adoption of sophisticated detection and mitigation strategies. Predictive analytics is surfaced to be a powerful tool in the fight against cybercrime, offering unparalleled capabilities for ...
Shomili Duary   +5 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy