Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("cyber security")

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 46

  • Page / 2
Export

Selection :

  • and

Cyber security threats in the power sector: Need for a domain specific regulatory framework in IndiaANANDA KUMAR, V; PANDEY, Krishan K; DEVENDRA KUMAR PUNIA et al.Energy policy. 2014, Vol 65, pp 126-133, issn 0301-4215, 8 p.Article

The Integration of Diversely Redundant Designs, Dynamic System Models, and State Estimation Technology to the Cyber Security of Physical SystemsHOROWITZ, Barry M; PIERCE, Katherine M.Systems engineering (Print). 2013, Vol 16, Num 4, pp 401-412, issn 1098-1241, 12 p.Article

From information security to cyber securityVON SOLMS, Rossouw; VAN NIEKERK, Johan.Computers & security. 2013, Vol 38, pp 97-102, issn 0167-4048, 6 p.Article

Where computer security meets national securityNISSENBAUM, Helen.Ethics and information technology. 2005, Vol 7, Num 2, pp 61-73, issn 1388-1957, 13 p.Article

Executives need to know : The arguments to include in a benefits justification for increased cyber security spendingBRAITHWAITE, Timothy.Information systems security. 2001, Vol 10, Num 4, pp 35-48, issn 1065-898XArticle

Automatic forensic log file analysis for Mac OS X systemsTUREDI, Zeki; LIANGXIU HAN.International journal of electronic security and digital forensics (Print). 2013, Vol 5, Num 2, pp 124-138, issn 1751-911X, 15 p.Article

Cyber-Security and Risk Management in an Interoperable World: An Examination of Governmental Action in North America : E-Government InteroperabilityQUIGLEY, Kevin; ROY, Jeffrey.Social science computer review. 2012, Vol 30, Num 1, pp 83-94, issn 0894-4393, 12 p.Article

Nineteen national cyber security strategiesLUIIJF, Eric; BESSELING, Kim; DE GRAAF, Patrick et al.International journal of critical infrastructures. 2013, Vol 9, Num 1-2, pp 3-31, issn 1475-3219, 29 p.Article

Learning from socio-economic characteristics of IP geo-locations for cybercrime predictionKIANMEHR, Keivan; KOOCHAKZADEH, Negar.International journal of business intelligence and data mining (Print). 2012, Vol 7, Num 1-2, pp 21-39, issn 1743-8187, 19 p.Article

Safety securing approach against cyber-attacks for process control systemHASHIMOTO, Yoshihiro; TOYOSHIMA, Takeshi; YOGO, Shuichi et al.Computers & chemical engineering. 2013, Vol 57, pp 181-186, issn 0098-1354, 6 p.Article

Security Protocols Against Cyber Attacks in the Distribution Automation SystemLIM, I. H; HONG, S; CHOI, M. S et al.IEEE transactions on power delivery. 2010, Vol 25, Num 1, pp 448-455, issn 0885-8977, 8 p.Article

Framework and principles for active cyber defenseDENNING, Dorothy E.Computers & security. 2014, Vol 40, pp 108-113, issn 0167-4048, 6 p.Article

Cyber terrorism challenges: The need for a global response to a multi-jurisdictional crimePARDIS MOSLEMZADEH TEHRANI; NAZURA ABDUL MANAP; TAJI, Hossein et al.Computer law and security report. 2013, Vol 29, Num 3, pp 207-215, issn 0267-3649, 9 p.Article

Cyber situational awareness ― A systematic review of the literatureFRANKE, Ulrik; BRYNIELSSON, Joel.Computers & security. 2014, Vol 46, pp 18-31, issn 0167-4048, 14 p.Article

Security as a theoretical attribute constructBAYUK, Jennifer L.Computers & security. 2013, Vol 37, pp 155-175, issn 0167-4048, 21 p.Article

Understanding and overcoming cyber security anti-patterns : Specail issue on 'Towards a Science of Cyber Security'JULISCH, Klaus.Computer networks (1999). 2013, Vol 57, Num 10, pp 2206-2211, issn 1389-1286, 6 p.Article

Asset Analysis of Risk Assessment for IEC 61850-Based Power Control Systems-Part I: MethodologyNIAN LIU; JIANHUA ZHANG; XU WU et al.IEEE transactions on power delivery. 2011, Vol 26, Num 2, pp 869-875, issn 0885-8977, 7 p.Article

Future E-Enabled Aircraft Communications and Security: The Next 20 Years and Beyond: This paper shows how the envisioned e-enabled aircraft play a central role in streamlining system modernization efforts; challenges, emerging solutions, and open problems are highlighted : AEROSPACE COMMUNICATIONS AND NETWORKING IN THE NEXT TWO DECADES CURRENT TRENDS AND FUTURE PERSPECTIVESSAMPIGETHAYA, Krishna; POOVENDRAN, Radha; SHETTY, Sudhakar et al.Proceedings of the IEEE. 2011, Vol 99, Num 11, pp 2040-2055, issn 0018-9219, 16 p.Article

Towards modelling the impact of cyber attacks on a smart gridKUNDUR, D; FENG, X; MASHAYEKH, S et al.International journal of security and networks (Print). 2011, Vol 6, Num 1, pp 2-13, issn 1747-8405, 12 p.Article

Vulnerability of interconnected power systems to malicious attacks under limited informationBOMPARD, Ettore; NAPOLI, Roberto; FEI XUE et al.European transactions on electrical power. 2008, Vol 18, Num 8, pp 820-834, issn 1430-144X, 15 p.Article

ChameleonSoft: Software Behavior Encryption for Moving Target DefenseAZAB, Mohamed; ELTOWEISSY, Mohamed.Journal on special topics in mobile networks and applications. 2013, Vol 18, Num 2, pp 271-292, issn 1383-469X, 22 p.Conference Paper

A Precise and Practical IP Traceback Technique Based on Packet Marking and LoggingDONG YAN; YULONG WANG; SEN SU et al.Journal of information science and engineering. 2012, Vol 28, Num 3, pp 453-470, issn 1016-2364, 18 p.Article

Visual Analytics for cyber security and intelligenceLAVIGNE, Valérie; GOUIN, Denis.Journal of defense modeling and simulation. 2014, Vol 11, Num 2, pp 175-199, issn 1548-5129, 25 p.Article

Aviation Cyber-Physical Systems: Foundations for Future Aircraft and Air TransportSAMPIGETHAYA, Krishna; POOVENDRAN, Radha.Proceedings of the IEEE. 2013, Vol 101, Num 8, pp 1834-1855, issn 0018-9219, 22 p.Article

Cyber Security and Power System Communication—Essential Parts of a Smart Grid InfrastructureERICSSON, Göran N.IEEE transactions on power delivery. 2010, Vol 25, Num 3, pp 1501-1507, issn 0885-8977, 7 p.Article

  • Page / 2