Securing cyber security at all fronts
| Main Author: | Sani, Rozana |
|---|---|
| Format: | Newspaper |
| Language: | English |
| Published: |
2017
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/59613/ http://psasir.upm.edu.my/id/eprint/59613/1/Securing%20cyber%20security%20at%20all%20fronts.pdf |
Similar Items
A survey on cyber security of CAV
by: He, Qiyi, et al.
Published: (2017)
by: He, Qiyi, et al.
Published: (2017)
Cyber Security Awareness Webinar Preparing
by: Mritha, Ramalingam
Published: (2021)
by: Mritha, Ramalingam
Published: (2021)
Cyber security in the open data: where is the equilibrium?
by: Zulhuda, Sonny
Published: (2017)
by: Zulhuda, Sonny
Published: (2017)
An overview on cyber security awareness in Muslim countries
by: Basamh, Saeed S., et al.
Published: (2014)
by: Basamh, Saeed S., et al.
Published: (2014)
Cyber Security Awareness Among Students In Ump
by: Nur Madihah, Mazlan
Published: (2023)
by: Nur Madihah, Mazlan
Published: (2023)
Interplay between cyber supply chain risk management practices and cyber security performance
by: Gani, Anisha Banu Dawood, et al.
Published: (2022)
by: Gani, Anisha Banu Dawood, et al.
Published: (2022)
Cyber security and open government in Malaysia: issues and development
by: Zulhuda, Sonny
Published: (2016)
by: Zulhuda, Sonny
Published: (2016)
Webinar Cyber security and IR 4.0 Awareness
by: Mritha, Ramalingam
Published: (2021)
by: Mritha, Ramalingam
Published: (2021)
Cyber warfare impact to national security - Malaysia experiences
by: Azian, Ibrahim, et al.
Published: (2019)
by: Azian, Ibrahim, et al.
Published: (2019)
Cyber security maturity model and Maqasid al-Shari'ah
by: M. Ridza, Nadwiyah, et al.
Published: (2018)
by: M. Ridza, Nadwiyah, et al.
Published: (2018)
A systematic review of approaches to assessing cyber security awareness
by: Abd Rahim, Noor Hayani, et al.
Published: (2015)
by: Abd Rahim, Noor Hayani, et al.
Published: (2015)
A comprehensive insight into game theory in relevance to cyber security
by: Anwar, Farhat, et al.
Published: (2020)
by: Anwar, Farhat, et al.
Published: (2020)
How to Cultivate Cyber Security Culture? The Evidences from Literature
by: Akhyari, Nasir, et al.
Published: (2023)
by: Akhyari, Nasir, et al.
Published: (2023)
UMP, CyberSecurity tingkat keupayaan pakar keselamatan siber
by: Nor Salwana, Mohammad Idris
Published: (2021)
by: Nor Salwana, Mohammad Idris
Published: (2021)
Interplay between Supply Chain Visibility and Cyber Security Performance
by: Gani, Anisha Banu Dawood, et al.
Published: (2021)
by: Gani, Anisha Banu Dawood, et al.
Published: (2021)
Web-Based Reporting Vulnerabilities System for Cyber Security Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
Web-Based Reporting Vulnerabilities System for Cyber Security
Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
Web-Based Reporting Vulnerabilities System for Cyber Security
Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
Web-Based Reporting Vulnerabilities System for Cyber Security
Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
Web-Based Reporting Vulnerabilities System for Cyber Security
Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
A systematic literature review of mitigating cyber security risk
by: Kamarudin, Syafila, et al.
Published: (2023)
by: Kamarudin, Syafila, et al.
Published: (2023)
Cyber security awareness: Is there any significant difference in demographic factors?
by: Sharkawi, Ismawati, et al.
Published: (2023)
by: Sharkawi, Ismawati, et al.
Published: (2023)
Pesonal data governance in Malaysia from a cyber security perspective
by: Zulhuda, Sonny
Published: (2016)
by: Zulhuda, Sonny
Published: (2016)
Cyber security awareness levels in smartphone usage among UPM students
by: Kamarudin, Syafila
Published: (2024)
by: Kamarudin, Syafila
Published: (2024)
Social media usage and awareness of cyber security issues among youths
by: Ahmad, F., et al.
Published: (2020)
by: Ahmad, F., et al.
Published: (2020)
Maintaining ideological security and legitimacy in digital China: Governance of cyber historical nihilism
by: Xu, Jian, et al.
Published: (2022)
by: Xu, Jian, et al.
Published: (2022)
The rise of deep learning in cyber security: Bibliometric analysis of deep learning and malware
by: Nur Khairani, Kamarudin, et al.
Published: (2024)
by: Nur Khairani, Kamarudin, et al.
Published: (2024)
Cyber–information security compliance and violation behaviour in organisations: A systematic review
by: Sulaiman, Noor Suhani, et al.
Published: (2022)
by: Sulaiman, Noor Suhani, et al.
Published: (2022)
Risk analysis of cyber-campus modules (security guidelines of electronic academic assets)
by: Ibrahim, Subariah
Published: (2002)
by: Ibrahim, Subariah
Published: (2002)
Risk analysis of cyber-campus modules (security guidelines of electronic academic assets)
by: Ibrahim, Subariah, et al.
Published: (2003)
by: Ibrahim, Subariah, et al.
Published: (2003)
National information infrastructure organisations and cyber security compliance in Malaysia / Maslina Daud
by: Maslina , Daud
Published: (2018)
by: Maslina , Daud
Published: (2018)
Modelling cyber-security experts' decision making processes using aggregation operators
by: Miller, Simon, et al.
Published: (2016)
by: Miller, Simon, et al.
Published: (2016)
Evaluating Cyber Security Awareness Levels For Employees In DRB-Hicom Auto Solutions
by: Mohd Fadli Kasim,
Published: (2021)
by: Mohd Fadli Kasim,
Published: (2021)
Toward a Cyber Security Adoption Framework for Primary and Secondary Education Providers
by: Torres, Mason, et al.
Published: (2020)
by: Torres, Mason, et al.
Published: (2020)
Taxonomy of Wireless Sensor Network Cyber Security Attacks in the Oil and Gas Industries
by: Rahmand, Pedram, et al.
Published: (2010)
by: Rahmand, Pedram, et al.
Published: (2010)
An analysis of the deployment of synergistic cyber security awareness model for the elderly (SCSAM-Elderly) in Malaysia
by: Nurul Alieyah Azam,, et al.
Published: (2024)
by: Nurul Alieyah Azam,, et al.
Published: (2024)
iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems
by: Azad, Saiful, et al.
Published: (2024)
by: Azad, Saiful, et al.
Published: (2024)
Securing a Wireless Site Network to Create a BIM-allied Work-front
by: Rahnamayiezekavat, Payam
Published: (2014)
by: Rahnamayiezekavat, Payam
Published: (2014)
A machine learning-based anomaly detection framework for connected and autonomous vehicles cyber security
by: He, Qiyi
Published: (2021)
by: He, Qiyi
Published: (2021)
I-Personal Financial Organizer (I-Pfo): A Cyber Security Framework For I-Pfo.
by: Annie Ng, Ai Bee
Published: (2010)
by: Annie Ng, Ai Bee
Published: (2010)
Similar Items
-
A survey on cyber security of CAV
by: He, Qiyi, et al.
Published: (2017) -
Cyber Security Awareness Webinar Preparing
by: Mritha, Ramalingam
Published: (2021) -
Cyber security in the open data: where is the equilibrium?
by: Zulhuda, Sonny
Published: (2017) -
An overview on cyber security awareness in Muslim countries
by: Basamh, Saeed S., et al.
Published: (2014) -
Cyber Security Awareness Among Students In Ump
by: Nur Madihah, Mazlan
Published: (2023)