2 Cyber risk and cybersecurity: a systematic review of data availability
Author: ncbi.nlm.nih.gov
Published: 12/11/2021
Review: 4.66 (290 vote)
Summary: A similar approach to data collection was used by Arcuri et al. (2020) to gather an original sample of global cyberattacks from newspaper reports sourced from
3 Journal of Cybersecurity and Privacy | An Open Access … – MDPI
Author: mdpi.com
Published: 05/13/2022
Review: 4.56 (233 vote)
Summary: This article identifies human factors in workplaces that contribute to the challenges faced by cybersecurity leadership within organizations and discusses
Source: https://www.mdpi.com/journal/jcp
4 Cyber Security Threats in Cloud: Literature Review – IEEE Xplore
Author: ieeexplore.ieee.org
Published: 08/26/2021
Review: 4.23 (239 vote)
Summary: The goal of this paper is collection of most common cyber security threats in the cloud system environment and most common used mitigation techniques by
Summary: Articles · CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION · CYBER SECURITY ATTRIBUTES FOR CRITICAL INFRASTRUCTURE SYSTEMS · CYBER INSIDERS: A BOARD ISSUE
Summary: This paper explores how cybercrime has become a serious threat in our lives and we are going to look at a few of the different security methods that are being
Summary: Journal of Cybersecurity publishes accessible articles describing original research in the inherently interdisciplinary world of computer, systems,
Source: https://academic.oup.com/cybersecurity
8 [PDF] Perspectives on transforming cybersecurity – McKinsey
Author: mckinsey.com
Published: 12/15/2021
Review: 3.41 (262 vote)
Summary: review of the entire portfolio of initiatives under … 2 By cybersecurity, this article means the full set of business and technology actions required to
9 Simulations in Cyber-Security: A Review of Cognitive Modeling of
Author: frontiersin.org
Published: 12/27/2021
Review: 3.3 (355 vote)
Summary: · Moreover, much of the basic research in cyber-related human factors and cyber epidemiology benefits from simulation software. The dynamics of
Summary: About the Journal · OPEN ACCESS. ARTICLE · Web Tracking Domain and Possible Privacy Defending Tools: A Literature Review · Maryam Abdulaziz Saad Bubukayr1,*,
Source: https://www.techscience.com/journal/JCS
15 A Systematic Review of Cyber Security and Classification of Attacks
Author: thesai.org
Published: 09/28/2021
Review: 2.5 (62 vote)
Summary: In this paper we have covered the different aspect of cyber security and Network security in the modern era. We have also tried to cover the threats in
16 Cybersecurity Research: A Review of Current Research Topics
Author: worldscientific.com
Published: 01/05/2022
Review: 2.34 (58 vote)
Summary: This paper provides a holistic picture of cybersecurity issues, for instance, fundamental theories, impressive research methods, and influencing factors. More
Summary: Cyberattacks are also very expensive, with the average cost of a breach pegged at over $2.4 million in notification, forensics, legal fees, and fines. This
Summary: Focusing on cyberspace security issues, this open access journal Cybersecurity publishes high quality research and expert reviews to report the latest
20 Dangerous games: A literature review on cybersecurity investments
Author: onlinelibrary.wiley.com
Published: 09/25/2021
Review: 1.99 (151 vote)
Summary: · This paper surveys the theoretical literature on the firms’ incentives to invest in cybersecurity. A taxonomy of the existing contributions is
21 A Review on Cyber Security and the Fifth Generation Cyberattacks
Author: researchgate.net
Published: 04/18/2022
Review: 1.95 (181 vote)
Summary: · This paper presents the significance of cyber security along with the various risks that are in the current digital era. The analysis made for
23 The state of research on cyberattacks against hospitals and
Author: bmcmedinformdecismak.biomedcentral.com
Published: 07/01/2022
Review: 1.79 (81 vote)
Summary: · Of the six research domains that emerged in this scoping review, the cybersecurity of connected medical devices and equipment presented as the
Summary: Explore articles · The baseline of global consumer cyber security standards for IoT: quality evaluation · Memory forensics tools: a comparative analysis
27 Journal of Cyber Security and Mobility Peer-Review Duration
Author: academic-accelerator.com
Published: 12/19/2021
Review: 1.28 (170 vote)
Summary: Journal of Cyber Security and Mobility is an international, open-access, peer reviewed journal publishing original research, review/survey, and tutorial papers
28 Cyber Security Research Paper Topics | 40 Excellent Picks
Author: freepaperwriter.com
Published: 09/10/2021
Review: 1.2 (181 vote)
Summary: 40 Great Cyber Security Research Paper Topics for Free · Brainstorm. The first thing to do if you wish to select the best heading for your cybersecurity
29 Cyber security: challenges for society- literature review
Author: semanticscholar.org
Published: 01/21/2022
Review: 1.13 (75 vote)
Summary: This paper describes the challenges due to lack of coordination between Security agencies and the Critical IT Infrastructure, and focuses on cyber security