Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("cyber security")

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 27

  • Page / 2
Export

Selection :

  • and

From information security to cyber securityVON SOLMS, Rossouw; VAN NIEKERK, Johan.Computers & security. 2013, Vol 38, pp 97-102, issn 0167-4048, 6 p.Article

Where computer security meets national securityNISSENBAUM, Helen.Ethics and information technology. 2005, Vol 7, Num 2, pp 61-73, issn 1388-1957, 13 p.Article

Executives need to know : The arguments to include in a benefits justification for increased cyber security spendingBRAITHWAITE, Timothy.Information systems security. 2001, Vol 10, Num 4, pp 35-48, issn 1065-898XArticle

Automatic forensic log file analysis for Mac OS X systemsTUREDI, Zeki; LIANGXIU HAN.International journal of electronic security and digital forensics (Print). 2013, Vol 5, Num 2, pp 124-138, issn 1751-911X, 15 p.Article

Cyber-Security and Risk Management in an Interoperable World: An Examination of Governmental Action in North America : E-Government InteroperabilityQUIGLEY, Kevin; ROY, Jeffrey.Social science computer review. 2012, Vol 30, Num 1, pp 83-94, issn 0894-4393, 12 p.Article

Safety securing approach against cyber-attacks for process control systemHASHIMOTO, Yoshihiro; TOYOSHIMA, Takeshi; YOGO, Shuichi et al.Computers & chemical engineering. 2013, Vol 57, pp 181-186, issn 0098-1354, 6 p.Article

Security Protocols Against Cyber Attacks in the Distribution Automation SystemLIM, I. H; HONG, S; CHOI, M. S et al.IEEE transactions on power delivery. 2010, Vol 25, Num 1, pp 448-455, issn 0885-8977, 8 p.Article

Framework and principles for active cyber defenseDENNING, Dorothy E.Computers & security. 2014, Vol 40, pp 108-113, issn 0167-4048, 6 p.Article

Cyber terrorism challenges: The need for a global response to a multi-jurisdictional crimePARDIS MOSLEMZADEH TEHRANI; NAZURA ABDUL MANAP; TAJI, Hossein et al.Computer law and security report. 2013, Vol 29, Num 3, pp 207-215, issn 0267-3649, 9 p.Article

Asset Analysis of Risk Assessment for IEC 61850-Based Power Control Systems-Part I: MethodologyNIAN LIU; JIANHUA ZHANG; XU WU et al.IEEE transactions on power delivery. 2011, Vol 26, Num 2, pp 869-875, issn 0885-8977, 7 p.Article

Future E-Enabled Aircraft Communications and Security: The Next 20 Years and Beyond: This paper shows how the envisioned e-enabled aircraft play a central role in streamlining system modernization efforts; challenges, emerging solutions, and open problems are highlighted : AEROSPACE COMMUNICATIONS AND NETWORKING IN THE NEXT TWO DECADES CURRENT TRENDS AND FUTURE PERSPECTIVESSAMPIGETHAYA, Krishna; POOVENDRAN, Radha; SHETTY, Sudhakar et al.Proceedings of the IEEE. 2011, Vol 99, Num 11, pp 2040-2055, issn 0018-9219, 16 p.Article

Towards modelling the impact of cyber attacks on a smart gridKUNDUR, D; FENG, X; MASHAYEKH, S et al.International journal of security and networks (Print). 2011, Vol 6, Num 1, pp 2-13, issn 1747-8405, 12 p.Article

Vulnerability of interconnected power systems to malicious attacks under limited informationBOMPARD, Ettore; NAPOLI, Roberto; FEI XUE et al.European transactions on electrical power. 2008, Vol 18, Num 8, pp 820-834, issn 1430-144X, 15 p.Article

ChameleonSoft: Software Behavior Encryption for Moving Target DefenseAZAB, Mohamed; ELTOWEISSY, Mohamed.Journal on special topics in mobile networks and applications. 2013, Vol 18, Num 2, pp 271-292, issn 1383-469X, 22 p.Conference Paper

A Precise and Practical IP Traceback Technique Based on Packet Marking and LoggingDONG YAN; YULONG WANG; SEN SU et al.Journal of information science and engineering. 2012, Vol 28, Num 3, pp 453-470, issn 1016-2364, 18 p.Article

Cyber Security and Power System Communication—Essential Parts of a Smart Grid InfrastructureERICSSON, Göran N.IEEE transactions on power delivery. 2010, Vol 25, Num 3, pp 1501-1507, issn 0885-8977, 7 p.Article

Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q)PARSONS, Kathryn; MCCORMAC, Agata; BUTAVICIUS, Marcus et al.Computers & security. 2014, Vol 42, pp 165-176, issn 0167-4048, 12 p.Article

Characterizing Honeypot-Captured Cyber Attacks: Statistical Framework and Case StudyZHENXIN ZHAN; MAOCHAO XU; SHOUHUAI XU et al.IEEE transactions on information forensics and security. 2013, Vol 8, Num 11-12, pp 1775-1789, issn 1556-6013, 15 p.Article

Cyber-security Research Ethics Dialogue & Strategy WorkshopKENNEALLY, Erin; BAILEY, Michael.Computer communication review. 2014, Vol 44, Num 2, pp 76-79, issn 0146-4833, 4 p.Article

Efficient network security as a strategic gameSCHLAKE, Fari; MILI, Lamine.International journal of critical infrastructures. 2013, Vol 9, Num 3, pp 243-273, issn 1475-3219, 31 p.Article

A System-Aware Cyber Security ArchitectureJONES, Rick A; HOROWITZ, Barry.Systems engineering (Print). 2012, Vol 15, Num 2, pp 225-240, issn 1098-1241, 16 p.Article

Proposal strategies of key management for data encryption in SCADA network of electric power systemsKANG, D. J; LEE, J. J; KIM, B. H et al.Electrical power & energy systems. 2011, Vol 33, Num 9, pp 1521-1526, issn 0142-0615, 6 p.Article

Smart grid cyber security for EuropePEARSON, Ivan L. G.Energy policy. 2011, Vol 39, Num 9, pp 5211-5218, issn 0301-4215, 8 p.Article

Security in e-business and beyond : a case study reflecting current situations and future trendsCHEN, Jason C. H; CHINIWAR, Sandeep; BINSHAN LIN et al.International journal of mobile communications (print). 2006, Vol 4, Num 1, pp 17-33, issn 1470-949X, 17 p.Article

Protecting the communication: Data protection and security measures under telecommunications regulations in the digital ageGÜRKAYNAK, Gönenç; YILMAZ, Ilay; TASKIRAN, Nazli Pinar et al.Computer law and security report. 2014, Vol 30, Num 2, pp 179-189, issn 0267-3649, 11 p.Article

  • Page / 2