Managing cybersecurity

被引:0
|
作者
Cisco Systems [1 ]
不详 [2 ]
不详 [3 ]
机构
来源
IT Prof | 2007年 / 2卷 / 09期
关键词
D O I
10.1109/MITP.2007.33
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] Managing Cybersecurity Break-ins Using Bluetooth Low Energy Devices to Verify Attackers: A Practical Study
    Wong, Kenneth C. K.
    Hunter, Aaron
    2017 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2017, : 432 - 437
  • [32] Cybersecurity In Microgrids
    Cruz-Duarte, Sebastian
    Gaona-Garcia, Paulo A.
    Gaona-Garcia, Elvis E.
    2018 IEEE 6TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD WORKSHOPS (W-FICLOUD 2018), 2018, : 7 - 12
  • [33] Doctrine for Cybersecurity
    Mulligan, Deirdre K.
    Schneider, Fred B.
    DAEDALUS, 2011, 140 (04) : 70 - 92
  • [34] Cybersecurity threats
    Reena Wadia
    British Dental Journal, 2024, 237 (10) : 793 - 793
  • [35] Cybersecurity and the Future
    Dietrich, Sven
    COMPUTER, 2017, 50 (04) : 7 - 7
  • [36] Challenges in cybersecurity
    Tang, Thomas S. K.
    ASIAN JOURNAL OF BUSINESS ETHICS, 2024, 13 (SUPPL 1) : 13 - 19
  • [37] Cybersecurity challenge
    Meshberg, Gary
    Lighting Design and Application: LD and A, 2019, 49 (02): : 14 - 15
  • [38] Cybersecurity in Russia
    Olga Chislova
    Marina Sokolova
    International Cybersecurity Law Review, 2021, 2 (2): : 245 - 251
  • [39] SIS cybersecurity
    Diaz, Sergio
    Peixoto, Alexandre
    Control Engineering, 2019, 66 (05): : 21 - 23
  • [40] Strategic cybersecurity
    Aldaajeh, Saleh
    Alrabaee, Saed
    COMPUTERS & SECURITY, 2024, 141