-
141
Analysis of cybersecurity of cyber physical systems
Published 2023Get full text
Thesis-Master by Coursework -
142
-
143
Machine learning based cybersecurity analytics
Published 2018Get full text
Final Year Project (FYP) -
144
Multidimensional cybersecurity framework for strategic foresight
Published 2021“…Cybersecurity is now at the forefront of most organisations’ digital transformative agendas and National economic, social and political programmes. …”
Get full text
Article -
145
Guidelines for usable cybersecurity: past and present
Published 2011“…This is especially because poor usability in this context typically translates into inadequate application of cybersecurity tools and functionality, thereby ultimately limiting their effectiveness. …”
Conference item -
146
Comparative cybersecurity law in socialist Asia
Published 2022“…This Article is a comparative study of the cybersecurity laws adopted in China and Vietnam in 2017 and 2018, respectively. …”
Journal article -
147
Privacy Requirements in Cybersecurity Applications of Blockchain
Published 2018“…We explore a set of proposed uses of Blockchain within cybersecurity and consider their requirements for privacy. …”
Book section -
148
-
149
Malware ecologies: a politics of cybersecurity
Published 2019“…In doing so, I challenge contemporary discourses of cybersecurity to ask if conventional notions of who and what (per)form security are adequate, and how these are reconfigured through a radical 'more-than-human' politics, where malware are not just objects of security, but are active participants in its production and negotiation.…”
Thesis -
150
Make cybersecurity a strategic asset
Published 2020“…By elevating cybersecurity from an operational necessity to a source of opportunity, leaders can boost resilience and business advantage.…”
Journal article -
151
Reconfigure: feminist action research in cybersecurity
Published 2021“…This report presents a 10-month pilot study applying “action research” methods to cybersecurity. The Reconfigure Network ran a series of community workshops in which we invited participants to define their own cybersecurity threats, implement changes to protect themselves, and reflect on the role cybersecurity plays in their lives. …”
Report -
152
Cybersecurity decision support model to designing information technology security system based on risk analysis and cybersecurity framework
Published 2022-09-01Subjects: “…Cybersecurity…”
Get full text
Article -
153
What Will the Future of Cybersecurity Bring Us, and Will It Be Ethical? The Hunt for the Black Swans of Cybersecurity Ethics
Published 2023-01-01Subjects: “…Cybersecurity…”
Get full text
Article -
154
Big Data Analytics and Computational Intelligence for Cybersecurity /
Published [202“…This book can be a source for researchers, students, and practitioners interested in the fields of artificial intelligence, cybersecurity, data analytics, and recent trends of networks.…”
Get full text
software, multimedia -
155
Cybersecurity Issues, Challenges, and Solutions in the Business World /
Published 2023“…Cybersecurity Issues, Challenges, and Solutions in the Business World considers cybersecurity innovation alongside the methods and strategies for its joining with the business industry and discusses pertinent application zones such as smart city, e-social insurance, shrewd travel, and more. …”
Get full text
software, multimedia -
156
Kids Cybersecurity Using Computational Intelligence Techniques /
Published 2023“…This book is beneficial to postgraduate students and researchers' concerns on recent methods and approaches to kids' cybersecurity.…”
Get full text
software, multimedia -
157
The Challenges and Solutions of Cybersecurity Among Malaysian Companies
Published 2019“…The objective of this chapter is to analyze the challenges faced by Malaysian companies in cybersecurity and to determine solution for Malaysian companies to overcome challenges in cybersecurity. …”
Get full text
Get full text
Book Chapter -
158
Gamification of Cybersecurity for Workforce Development in Critical Infrastructure
Published 2022-01-01Subjects: “…Cybersecurity framework…”
Get full text
Article -
159
Constructing Cybersecurity Stocks Portfolio Using AI
Published 2024-11-01Subjects: Get full text
Article -
160
Strengthening Cybersecurity for Patient Data Protection in Europe
Published 2023-08-01“… The health care sector experiences 76% of cybersecurity breaches due to basic web application attacks, miscellaneous errors, and system intrusions, resulting in compromised health data or disrupted health services. …”
Get full text
Article