Works matching DE "CYBER intelligence (Computer security)"
Results: 603
Industrial Control Systems: Cyber Policies and Strategies.
- Published in:
- Journal: American Water Works Association, 2020, v. 112, n. 6, p. 48, doi. 10.1002/awwa.1518
- By:
- Publication type:
- Article
Tackle Cybersecurity and AWIA Compliance With AWWA's New Cybersecurity Risk Management Tool.
- Published in:
- Journal: American Water Works Association, 2020, v. 112, n. 3, p. 70, doi. 10.1002/awwa.1466
- By:
- Publication type:
- Article
Cybercrime Resilience in the Era of Advanced Technologies: Evidence from the Financial Sector of a Developing Country.
- Published in:
- Computers (2073-431X), 2025, v. 14, n. 2, p. 38, doi. 10.3390/computers14020038
- By:
- Publication type:
- Article
Cyber Threat Intelligence on Blockchain: A Systematic Literature Review.
- Published in:
- Computers (2073-431X), 2024, v. 13, n. 3, p. 60, doi. 10.3390/computers13030060
- By:
- Publication type:
- Article
Interoperability Challenges in the Cybersecurity Information Sharing Ecosystem.
- Published in:
- Computers (2073-431X), 2020, v. 9, n. 1, p. 18, doi. 10.3390/computers9010018
- By:
- Publication type:
- Article
Hackback: Der digitale Gegenschlag auf dem rechtlichen Prüfstand.
- Published in:
- IM + io, 2023, n. 3, p. 42
- By:
- Publication type:
- Article
Von falschen Freunden und echten Feinden: Die Facetten des Cyberkriegs.
- Published in:
- IM + io, 2023, n. 3, p. 14
- Publication type:
- Article
„ChatGPT, generiere mir einen Hackerangriff": Wie Künstliche Intelligenz Cybersicherheit neu definiert.
- Published in:
- IM + io, 2023, n. 3, p. 8
- By:
- Publication type:
- Article
ANGSTROMTECHNOLOGY OF AVIATION CYBERSECURITY.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2020, v. 26, n. 1, p. 28, doi. 10.18372/2225-5036.26.14667
- By:
- Publication type:
- Article
MECHANISMS OF CYBER SECURITY: THE PROBLEM OF CONCEPTUALIZATION.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2019, v. 25, n. 2, p. 110, doi. 10.18372/2225-5036.25.13841
- By:
- Publication type:
- Article
A Retrospective Analysis of Maritime Cyber Security Incidents.
- Published in:
- TransNav: International Journal on Marine Navigation & Safety of Sea Transportation, 2021, v. 15, n. 3, p. 519, doi. 10.12716/1001.15.03.04
- By:
- Publication type:
- Article
Ensuring Cybersecurity in Shipping: Reference to Estonian Shipowners.
- Published in:
- TransNav: International Journal on Marine Navigation & Safety of Sea Transportation, 2020, v. 14, n. 2, p. 271, doi. 10.12716/1001.14.02.01
- By:
- Publication type:
- Article
FROM INTELLIGENCE GATHERING TO CYBER THREAT DETECTION.
- Published in:
- Romanian Intelligence Studies Review / Revista Romana de Studii de Intelligence, 2023, n. 29, p. 6
- By:
- Publication type:
- Article
ANOTHER -INT ON THE HORIZON? CYBER-INTELLIGENCE IS THE NEW BLACK.
- Published in:
- Romanian Intelligence Studies Review / Revista Romana de Studii de Intelligence, 2017, n. 17/18, p. 127
- By:
- Publication type:
- Article
CYBER SECURITY AS A GLOBAL CHALLENGE TODAY.
- Published in:
- Singidunum Journal of Applied Sciences, 2014, p. 687, doi. 10.15308/SInteZa-2014-687-692
- By:
- Publication type:
- Article
THE "MOSAIC" WARFARE: A NEW AMERICAN STRATEGY FOR THE FUTURE.
- Published in:
- Strategic Impact, 2020, v. 75, n. 2, p. 25
- By:
- Publication type:
- Article
TALKING FOREIGN POLICY: A DISCUSSION ON CYBER WARFARE.
- Published in:
- 2015
- Publication type:
- Proceeding
Strategic warning intelligence: Revival needed.
- Published in:
- Comparative Strategy, 2025, v. 44, n. 2, p. 181, doi. 10.1080/01495933.2025.2456422
- By:
- Publication type:
- Article
Cyber intelligence: Actors, policies, and practices: Edited by Constance S. Uthoff, Boulder, CO: Lynne Rienner, 2022, $45.00, 441 pp., ISBN: 1626379661.
- Published in:
- 2024
- By:
- Publication type:
- Product Review
China's vision of the future network-centric battlefield: Cyber, space and electromagnetic asymmetric challenges to the United States.
- Published in:
- Comparative Strategy, 2018, v. 37, n. 5, p. 373, doi. 10.1080/01495933.2018.1526563
- By:
- Publication type:
- Article
Cyber attacks, self-defence and the problem of attribution.
- Published in:
- Journal of Conflict & Security Law, 2012, v. 17, n. 2, p. 229, doi. 10.1093/jcsl/krs019
- By:
- Publication type:
- Article
Cyber Attacks: Unlawful Uses of Force or Prohibited Interventions?
- Published in:
- Journal of Conflict & Security Law, 2012, v. 17, n. 2, p. 212, doi. 10.1093/jcsl/krs014
- By:
- Publication type:
- Article
Cyber Security without Cyber War.
- Published in:
- Journal of Conflict & Security Law, 2012, v. 17, n. 2, p. 187, doi. 10.1093/jcsl/krs017
- By:
- Publication type:
- Article
Classification of Cyber Conflict.
- Published in:
- Journal of Conflict & Security Law, 2012, v. 17, n. 2, p. 245, doi. 10.1093/jcsl/krs018
- By:
- Publication type:
- Article
Keystroke Dynamics User Authentication Based on Gaussian Mixture Model and Deep Belief Nets.
- Published in:
- ISRN Signal Processing, 2013, p. 1, doi. 10.1155/2013/565183
- By:
- Publication type:
- Article
Cyber Intelligence: Strategic Warning Is Possible.
- Published in:
- International Journal of Intelligence & Counterintelligence, 2023, v. 36, n. 3, p. 729, doi. 10.1080/08850607.2022.2095544
- By:
- Publication type:
- Article
Private-Sector Attribution of Cyber Incidents: Benefits and Risks to the U.S. Government.
- Published in:
- International Journal of Intelligence & Counterintelligence, 2021, v. 34, n. 3, p. 463, doi. 10.1080/08850607.2020.1783877
- By:
- Publication type:
- Article
Cyber Threat Intelligence: A Product Without a Process?
- Published in:
- International Journal of Intelligence & Counterintelligence, 2021, v. 34, n. 2, p. 300, doi. 10.1080/08850607.2020.1780062
- By:
- Publication type:
- Article
Missing the Mark in Counterintelligence: Gray Day: My Undercover Mission to Expose America's First Cyber Spy Crown Publishing Group, New York, 2019, 220 p., $27.00.
- Published in:
- 2020
- By:
- Publication type:
- Book Review
Evaluating Commercial Cyber Intelligence Activity.
- Published in:
- International Journal of Intelligence & Counterintelligence, 2020, v. 33, n. 2, p. 278, doi. 10.1080/08850607.2019.1690877
- By:
- Publication type:
- Article
Communicating Cyber Intelligence to Non-Technical Customers.
- Published in:
- International Journal of Intelligence & Counterintelligence, 2017, v. 30, n. 4, p. 743, doi. 10.1080/08850607.2017.1297120
- By:
- Publication type:
- Article
Index for Volume 27.
- Published in:
- International Journal of Intelligence & Counterintelligence, 2014, v. 27, n. 4, p. 855, doi. 10.1080/08850607.2014.924828
- Publication type:
- Article
Operational Levels of Cyber Intelligence.
- Published in:
- International Journal of Intelligence & Counterintelligence, 2014, v. 27, n. 4, p. 702, doi. 10.1080/08850607.2014.924811
- By:
- Publication type:
- Article
Investigating IPTV Malware in the Wild.
- Published in:
- Future Internet, 2023, v. 15, n. 10, p. 325, doi. 10.3390/fi15100325
- By:
- Publication type:
- Article
A New AI-Based Semantic Cyber Intelligence Agent.
- Published in:
- Future Internet, 2023, v. 15, n. 7, p. 231, doi. 10.3390/fi15070231
- By:
- Publication type:
- Article
An Automatic Generation Approach of the Cyber Threat Intelligence Records Based on Multi-Source Information Fusion.
- Published in:
- Future Internet, 2021, v. 13, n. 2, p. 40, doi. 10.3390/fi13020040
- By:
- Publication type:
- Article
A Systematic Review of Cybersecurity Risks in Higher Education.
- Published in:
- Future Internet, 2021, v. 13, n. 2, p. 39, doi. 10.3390/fi13020039
- By:
- Publication type:
- Article
Internet of Things (IoT) Cybersecurity: Literature Review and IoT Cyber Risk Management.
- Published in:
- Future Internet, 2020, v. 12, n. 9, p. 157, doi. 10.3390/fi12090157
- By:
- Publication type:
- Article
A Methodology to Evaluate Standards and Platforms within Cyber Threat Intelligence.
- Published in:
- Future Internet, 2020, v. 12, n. 6, p. 108, doi. 10.3390/fi12060108
- By:
- Publication type:
- Article
Towards the Design of a Collaborative Cybersecurity Networked Organisation: Identification and Prioritisation of Governance Needs and Objectives.
- Published in:
- Future Internet, 2020, v. 12, n. 4, p. 62, doi. 10.3390/fi12040062
- By:
- Publication type:
- Article
Improving Forensic Triage Efficiency through Cyber Threat Intelligence.
- Published in:
- Future Internet, 2019, v. 11, n. 7, p. 162, doi. 10.3390/fi11070162
- By:
- Publication type:
- Article
Reviewing Cyber Security Social Engineering Training and Awareness Programs—Pitfalls and Ongoing Issues.
- Published in:
- Future Internet, 2019, v. 11, n. 3, p. 73, doi. 10.3390/fi11030073
- By:
- Publication type:
- Article
Cyber Security Threat Modeling for Supply Chain Organizational Environments.
- Published in:
- Future Internet, 2019, v. 11, n. 3, p. 63, doi. 10.3390/fi11030063
- By:
- Publication type:
- Article
Faithworthy Collaborative Spectrum Sensing Based on Credibility and Evidence Theory for Cognitive Radio Networks.
- Published in:
- Symmetry (20738994), 2017, v. 9, n. 3, p. 36, doi. 10.3390/sym9030036
- By:
- Publication type:
- Article
The impact of neglecting user-centered information design principles when delivering online information: Cyber security awareness websites as a case study.
- Published in:
- Information Design Journal (IDJ), 2018, v. 24, n. 2, p. 151, doi. 10.1075/idj.00005.san
- By:
- Publication type:
- Article
The Current Status of Cyber Security in Ethiopia.
- Published in:
- IUP Journal of Information Technology, 2020, v. 16, n. 3, p. 7
- By:
- Publication type:
- Article
MODEL FOR CYBER SECURITY MATURITY ASSESSMENT IN CRITICAL INFRASTRUCTURES.
- Published in:
- Buletin Stiintific, 2021, p. 154
- By:
- Publication type:
- Article
Artificial intelligence analysis in cyber domain: A review.
- Published in:
- International Journal of Distributed Sensor Networks, 2022, v. 18, n. 4, p. 1, doi. 10.1177/15501329221084882
- By:
- Publication type:
- Article
HackerRank: Identifying key hackers in underground forums.
- Published in:
- International Journal of Distributed Sensor Networks, 2021, v. 17, n. 5, p. 1, doi. 10.1177/15501477211015145
- By:
- Publication type:
- Article
Educational modules and research surveys on critical cybersecurity topics.
- Published in:
- International Journal of Distributed Sensor Networks, 2020, v. 16, n. 9, p. 1, doi. 10.1177/1550147720954678
- By:
- Publication type:
- Article