1 A comprehensive review study of cyber-attacks and cyber security
Table of Contents
Author: sciencedirect.com
Published: 05/02/2022
Review: 4.9 (763 vote)
Summary: Research paper. A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments
2 [PDF] Cybersecurity Practices for Social Media Users: A Systematic … – MDPI
Author: mdpi.com
Published: 12/11/2021
Review: 4.71 (526 vote)
Summary: · statement is used in this research article to filter the most relevant … articles were as follows: cyber threats, cybersecurity,
3 Articles – Cybersecurity – SpringerOpen
Author: cybersecurity.springeropen.com
Published: 04/16/2022
Review: 4.42 (458 vote)
Summary: Focusing on cyberspace security issues, this open access journal Cybersecurity publishes high quality research and expert reviews to report the latest
Summary: Cybersecurity Framework Version 1.1. (April 2018). Letter to Stakeholders · Framework V1.1 (PDF) · Framework V1.1 (PDF) with markup · Framework V1.1 Core
5 An empirical study on cyber security threats and attacks
Author: academia.edu
Published: 11/23/2021
Review: 4.18 (440 vote)
Summary: This paper provides information about various recent trends in cyber-attacks and the vulnerability of infrastructure based on various research articles
7 National Cyber Security Strategy: Canada’s Vision for Security and
Author: publicsafety.gc.ca
Published: 12/27/2021
Review: 3.78 (471 vote)
Summary: National Cyber Security Strategy – PDF Version (565 KB) … investment in cyber security ever made by the Canadian government, Budget 2018 demonstrates our
8 [PDF] a study of cyber security challenges and its emergning trends … – arXiv
Author: arxiv.org
Published: 02/15/2022
Review: 3.45 (216 vote)
Summary: Cyber Security plays an important role in the field of information technology … This paper mainly … Cyber crime is a term for any illegal activity that
10 Journal of Information Security and Applications – Journals | Elsevier
Author: journals.elsevier.com
Published: 06/23/2022
Review: 3.14 (372 vote)
Summary: JISA provides a common linkage between a vibrant scientific and research … Machine Learning Techniques for Cyber Security: Challenges and Future Trends
11 Study of Baseline Cyber Security for Various Application Domains
Author: iopscience.iop.org
Published: 01/25/2022
Review: 2.92 (116 vote)
Summary: That means all information / data is done on the paper as not a written document, but in the form of digital and electronic data. A special type of computer-
12 [PDF] Perspectives on transforming cybersecurity – McKinsey
Author: mckinsey.com
Published: 05/14/2022
Review: 2.77 (53 vote)
Summary: proprietary research, have revealed three broad mandates that can help organizations … A new posture for cybersecurity in a networked world March 2018
13 Cyber risk and cybersecurity: a systematic review of data availability
Author: link.springer.com
Published: 01/04/2022
Review: 2.73 (196 vote)
Summary: · Finally, this research paper highlights the need for open access to cyber-specific data, without price or permission barriers
14 Cybersecurity in accounting research – Emerald Insight
Author: emerald.com
Published: 05/13/2022
Review: 2.67 (138 vote)
Summary: · Figure 1 presents the trends of cybersecurity-related studies in the accounting and auditing literature over the period 2000-2018. To conclude,
15 Cost of a Data Breach Report 2022 – IBM
Author: ibm.com
Published: 07/16/2022
Review: 2.56 (166 vote)
Summary: The annual Cost of a Data Breach Report, featuring research by Ponemon Institute, offers insights from 550 real breaches to help you understand cyber risk