Skip to search formSkip to main contentSkip to account menu

Cyber security standards

Known as: Cyber security certification, ISA 99, ISA99 
Cybersecurity standards (also styled cyber security standards) are techniques generally set forth in published materials that attempt to protect the… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
The article considers the issues of preventing damage to complex critical systems, caused by cybersecurity unreliability and… 
2018
2018
In the wake of a series of destabilizing and damaging cyber attacks ranging from Equifax to Yahoo!, there has been a growing call… 
2017
2017
In this paper, we consider a recently introduced cybersecurity investment supply chain game theory model consisting of retailers… 
2016
2016
Control systems manage the automated systems that run our world. The security of these systems is critical, but most modern best… 
2015
2015
Chapter 1 discussed the challenges facing today's cyberdefenders. So how does an enterprise successfully defend itself against… 
2015
2015
Cybersecurity for networked medical devices has been usually “bolted on” by manufacturers at the end of the design cycle, rather… 
2013
2013
INTRODUCTION[Y]ou might say every one of us is a fiddler on the roof trying to scratch out a pleasant, simple tune without… 
Review
2011
Review
2011
The Internet has given rise to new opportunities for the public sector to improve efficiency and better serve constituents in the… 
2011
2011
  • 2011
  • Corpus ID: 167874913
Junaid Ahmed Zubairi is currently an Associate Professor at Department of Computer and Information Sciences in the State…