Showing 201 - 220 results of 3,357 for search '"cyber security"', query time: 0.15s Refine Results
  1. 201

    Web-Based Reporting Vulnerabilities System for Cyber Security Maintenance by Hamid Ali, Firkhan Ali, Mohd Sukri, Mohd Khairul Amin, Jali, Mohd Zalisham, Muhammad AlFatih, Muhammad AlFatih, Mohd Yusof, Mohd Azhari

    Published 2023
    “…Among these reporting systems developed to deal with problems of maintenance and analysis report management system which not yet been implemented in the cyber security scanning tool, Nessus. The system, which was designed to manage and analyze cyber security maintenance by focusing on vulnerability reports, was based on web-based technology. …”
    Get full text
    Article
  2. 202

    Web-Based Reporting Vulnerabilities System for Cyber Security Maintenance by Hamid Ali, Firkhan Ali, Mohd Sukri, Mohd Khairul Amin, Jali, Mohd Zalisham, Muhammad AlFatih, Muhammad AlFatih, Mohd Yusof, Mohd Azhari

    Published 2023
    “…Among these reporting systems developed to deal with problems of maintenance and analysis report management system which not yet been implemented in the cyber security scanning tool, Nessus. The system, which was designed to manage and analyze cyber security maintenance by focusing on vulnerability reports, was based on web-based technology. …”
    Get full text
    Article
  3. 203
  4. 204
  5. 205
  6. 206
  7. 207
  8. 208
  9. 209
  10. 210
  11. 211
  12. 212

    Security of the European Union from the Point of View of Cyber Security Issues by Radoslav IVANČÍK

    Published 2019-12-01
    “…Measures against widespread cybercrime activities bring so much cyber security spending that it is almost impossible to keep track of their height. …”
    Get full text
    Article
  13. 213
  14. 214
  15. 215
  16. 216

    Cyber Security Controls in Nuclear Power Plant by Technical Assessment Methodology by Daun Jung, Jiho Shin, Chaechang Lee, Kookheui Kwon, Jung Taek Seo

    Published 2023-01-01
    “…Thus, the application of cyber security controls is necessary for mitigating security threats, especially to NPPs. …”
    Get full text
    Article
  17. 217

    Modern Aspects of Cyber-Security Training and Continuous Adaptation of Programmes to Trainees by George Hatzivasilis, Sotiris Ioannidis, Michail Smyrlis, George Spanoudakis, Fulvio Frati, Ludger Goeke, Torsten Hildebrandt, George Tsakirakis, Fotis Oikonomou, George Leftheriotis, Hristo Koshutanski

    Published 2020-08-01
    “…Nowadays, more-and-more cyber-security training is emerging as an essential process for the lifelong personnel education in organizations, especially for those which operate critical infrastructures. …”
    Get full text
    Article
  18. 218
  19. 219
  20. 220