Cyber security horizon: where threats to your information technology are coming from today and tomorrow

被引:0
|
作者
Scherer, Rob
机构
关键词
D O I
暂无
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
3
引用
收藏
页数:1
相关论文
共 50 条
  • [1] Information security economics: cyber security threats
    Hojda, Mihaela Hortensia
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON BUSINESS EXCELLENCE, 2022, 16 (01): : 584 - 592
  • [2] INFORMATION TECHNOLOGY TODAY AND TOMORROW
    KIMBEL, D
    TELECOMMUNICATIONS POLICY, 1987, 11 (04) : 377 - 389
  • [3] Threats on the horizon: understanding security threats in the era of cyber-physical systems
    Steven Walker-Roberts
    Mohammad Hammoudeh
    Omar Aldabbas
    Mehmet Aydin
    Ali Dehghantanha
    The Journal of Supercomputing, 2020, 76 : 2643 - 2664
  • [4] Threats on the horizon: understanding security threats in the era of cyber-physical systems
    Walker-Roberts, Steven
    Hammoudeh, Mohammad
    Aldabbas, Omar
    Aydin, Mehmet
    Dehghantanha, Ali
    JOURNAL OF SUPERCOMPUTING, 2020, 76 (04): : 2643 - 2664
  • [5] Preparing for Cyber Threats with Information Security Policies
    Ilvonen, Ilona
    Virtanen, Pasi
    INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2013, 3 (04) : 22 - 31
  • [6] Ocean Science and Technology = Security for Today and Tomorrow
    White, Jon
    SEA TECHNOLOGY, 2018, 59 (01) : 37 - 38
  • [7] ASPs: Here today, gone tomorrow, so where is your data?
    Labs, W
    CONTROL SOLUTIONS INTERNATIONAL, 2003, 76 (10): : 56 - 56
  • [8] Cyber security information exchange to gain insight into the effects of cyber threats and incidents
    Fransen, F.
    Smulders, A.
    Kerkdijk, R.
    ELEKTROTECHNIK UND INFORMATIONSTECHNIK, 2015, 132 (02): : 106 - 112
  • [9] IEC 61850: Technology Standards and Cyber-Security Threats
    Youssef, Tarek A.
    El Hariri, Mohamad
    Bugay, Nicole
    Mohammed, O. A.
    2016 IEEE 16TH INTERNATIONAL CONFERENCE ON ENVIRONMENT AND ELECTRICAL ENGINEERING (EEEIC), 2016,
  • [10] From information security to cyber security
    von Solms, Rossouw
    van Niekerk, Johan
    COMPUTERS & SECURITY, 2013, 38 : 97 - 102