-
181
Perspectives on cybersecurity: A collaborative study
Published 2022“…1. Cybersecurity – Problems, Premises, Perspectives 2 An Abbreviated Technical Perspective on Cybersecurity 3 The Conceptual Underpinning of Cyber Security Studies 4 Cyberspace as the Domain of Content 5 DoD Perspective on Cyberspace 6 China’s Perspective on Cyber Security 7 Pursuing Deterrence Internationally in Cyberspace 8 Is Deterrence Possible in Cyber Warfare? …”
Get full text
Working Paper -
182
Analysis of cybersecurity of cyber physical systems
Published 2023Get full text
Thesis-Master by Coursework -
183
-
184
Machine learning based cybersecurity analytics
Published 2018Get full text
Final Year Project (FYP) -
185
Multidimensional cybersecurity framework for strategic foresight
Published 2021“…Cybersecurity is now at the forefront of most organisations’ digital transformative agendas and National economic, social and political programmes. …”
Get full text
Article -
186
Guidelines for usable cybersecurity: past and present
Published 2011“…This is especially because poor usability in this context typically translates into inadequate application of cybersecurity tools and functionality, thereby ultimately limiting their effectiveness. …”
Conference item -
187
Comparative cybersecurity law in socialist Asia
Published 2022“…This Article is a comparative study of the cybersecurity laws adopted in China and Vietnam in 2017 and 2018, respectively. …”
Journal article -
188
Privacy Requirements in Cybersecurity Applications of Blockchain
Published 2018“…We explore a set of proposed uses of Blockchain within cybersecurity and consider their requirements for privacy. …”
Book section -
189
-
190
Malware ecologies: a politics of cybersecurity
Published 2019“…In doing so, I challenge contemporary discourses of cybersecurity to ask if conventional notions of who and what (per)form security are adequate, and how these are reconfigured through a radical 'more-than-human' politics, where malware are not just objects of security, but are active participants in its production and negotiation.…”
Thesis -
191
Make cybersecurity a strategic asset
Published 2020“…By elevating cybersecurity from an operational necessity to a source of opportunity, leaders can boost resilience and business advantage.…”
Journal article -
192
Reconfigure: feminist action research in cybersecurity
Published 2021“…This report presents a 10-month pilot study applying “action research” methods to cybersecurity. The Reconfigure Network ran a series of community workshops in which we invited participants to define their own cybersecurity threats, implement changes to protect themselves, and reflect on the role cybersecurity plays in their lives. …”
Report -
193
Cybersecurity decision support model to designing information technology security system based on risk analysis and cybersecurity framework
Published 2022-09-01Subjects: “…Cybersecurity…”
Get full text
Article -
194
What Will the Future of Cybersecurity Bring Us, and Will It Be Ethical? The Hunt for the Black Swans of Cybersecurity Ethics
Published 2023-01-01Subjects: “…Cybersecurity…”
Get full text
Article -
195
Big Data Analytics and Computational Intelligence for Cybersecurity /
Published [202“…This book can be a source for researchers, students, and practitioners interested in the fields of artificial intelligence, cybersecurity, data analytics, and recent trends of networks.…”
Get full text
software, multimedia -
196
Cybersecurity Issues, Challenges, and Solutions in the Business World /
Published 2023“…Cybersecurity Issues, Challenges, and Solutions in the Business World considers cybersecurity innovation alongside the methods and strategies for its joining with the business industry and discusses pertinent application zones such as smart city, e-social insurance, shrewd travel, and more. …”
Get full text
software, multimedia -
197
Kids Cybersecurity Using Computational Intelligence Techniques /
Published 2023“…This book is beneficial to postgraduate students and researchers' concerns on recent methods and approaches to kids' cybersecurity.…”
Get full text
software, multimedia -
198
The Challenges and Solutions of Cybersecurity Among Malaysian Companies
Published 2019“…The objective of this chapter is to analyze the challenges faced by Malaysian companies in cybersecurity and to determine solution for Malaysian companies to overcome challenges in cybersecurity. …”
Get full text
Get full text
Book Chapter -
199
Regulatory Cybersecurity in the European Union and the Republic of Moldova
Published 2019-12-01Subjects: Get full text
Article -
200
Gamification of Cybersecurity for Workforce Development in Critical Infrastructure
Published 2022-01-01Subjects: “…Cybersecurity framework…”
Get full text
Article