Cybersecurity: What everyone needs to know PW Singer, A Friedman oup usa, 2014 | 1345 | 2014 |
A survey of emerging threats in cybersecurity J Jang-Jaccard, S Nepal Journal of computer and system sciences 80 (5), 973-993, 2014 | 1194 | 2014 |
Cybersecurity data science: an overview from machine learning perspective IH Sarker, ASM Kayes, S Badsha, H Alqahtani, P Watters, A Ng Journal of Big data 7, 1-29, 2020 | 731 | 2020 |
Cybersecurity for Industry 4.0 in the current literature: A reference framework M Lezzi, M Lazoi, A Corallo Computers in Industry 103, 97-110, 2018 | 468 | 2018 |
Machine learning techniques applied to cybersecurity J Martínez Torres, C Iglesias Comesaña, PJ García-Nieto International Journal of Machine Learning and Cybernetics 10 (10), 2823-2836, 2019 | 248 | 2019 |
Framework for improving critical infrastructure cybersecurity CI Cybersecurity URL: https://nvlpubs. nist. gov/nistpubs/CSWP/NIST. CSWP 4162018, 7, 2018 | 242* | 2018 |
Defining cybersecurity law J Kosseff Iowa L. Rev. 103, 985, 2017 | 175 | 2017 |
Cybersecurity risk C Florackis, C Louca, R Michaely, M Weber The Review of Financial Studies 36 (1), 351-407, 2023 | 158 | 2023 |
Cybersecurity in health care ED Perakslis N Engl J Med 371 (5), 395-397, 2014 | 118 | 2014 |
The ethics of cybersecurity M Christen, B Gordijn, M Loi Springer Nature, 2020 | 110 | 2020 |
The new policy world of cybersecurity RJ Harknett, JA Stever Public Administration Review 71 (3), 455-460, 2011 | 107 | 2011 |
What is cybersecurity M Bay French Journal for Media Research 6, 1-28, 2016 | 37 | 2016 |
Cybersecurity A Ford | 14 | 2019 |
Framework for Improving Critical Infrastructure Cybersecurity. 2018 CI Cybersecurity | 5 | |
Cyber and IT Security Good Practices MS Obeidat LinkedIn, 3, 2018 | | 2018 |
Input to the Commission on Enhancing National Cybersecurity CI Cybersecurity | | 2016 |
Input to the Commission on Enhancing National Cybersecurity: Submissions by XAHIVE International LLC. CI Cybersecurity | | |
Auditing Cybersecurity CI Cybersecurity | | |