Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,316 papers from all fields of science
Search
Sign In
Create Free Account
NIST Cybersecurity Framework
The NIST Cybersecurity Framework (NIST CSF) provides a policy framework of computer security guidance for how private sector organizations can assess…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
COBIT
Computer security
Critical infrastructure protection
Cyber Resilience Review
Expand
Broader (1)
Cyberwarfare
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Mobile Technology in Healthcare Environment: Security Vulnerabilities and Countermeasures
Sajedul Talukder
,
Shalisha Witherspoon
,
Kanishk Srivastava
,
Ryan Thompson
arXiv.org
2018
Corpus ID: 51872365
Mobile devices and technologies offer a tremendous amount of benefits to users, although it is also understood that it introduces…
Expand
Review
2018
Review
2018
Cybersecurity Self-assessment Tools: Evaluating the Importance for Securing Industrial Control Systems in Critical Infrastructures
Georgia Lykou
,
Argiro Anagnostopoulou
,
G. Stergiopoulos
,
D. Gritzalis
Critical Information Infrastructures Security
2018
Corpus ID: 57375168
Periodically assessing the security status of Industrial Control Systems (ICS) is essential to enable cybersecurity compliance…
Expand
2018
2018
Securing Wireless Infusion Pumps
A. Arbelaez
,
Sallie Edwards
,
Kevin Littlefield
,
Sue Wang
,
Kangmin Zheng
IEEE Cybersecurity Development
2018
Corpus ID: 53740638
The National Cybersecurity Center of Excellence (NCCoE), a part of the National Institute of Standards and Technology (NIST), is…
Expand
2017
2017
Towards a Strategic Resilience of Applications through the NIST Cybersecurity Framework and the Strategic Alignment Model (SAM)
Alberto Belalcázar
,
Mario Ron
,
Javier Diaz
,
L. Molinari
International Conference Information Systems and…
2017
Corpus ID: 4563668
The applications deployed to serve the users, are the result of the organizations strategic decisions made to improve the…
Expand
2016
2016
Information Technology Risk Measurements and Metrics
Carl S. Young
2016
Corpus ID: 64152834
2016
2016
Evaluating the Gasday Security Policy Through Penetration Testing and Application of the Nist Cybersecurity Framework
Andrew Kirkham
2016
Corpus ID: 56333756
EVALUATING THE GASDAY SECURITY POLICY THROUGH PENETRATION TESTING AND APPLICATION OF THE NIST CYBERSECURITY FRAMEWORK Andrew N…
Expand
2015
2015
On building cybersecurity expertise in critical infrastructure protection
S. Mishra
,
R. Raj
,
C. Romanowski
,
J. Schneider
,
Anthony Critelli
IEEE International Conference on Technologies for…
2015
Corpus ID: 14981154
Cybersecurity professionals need training in critical infrastructure protection (CIP) to prepare them for solving problems in…
Expand
2014
2014
The Reasonable Information Security Program
P. Sloan
2014
Corpus ID: 63875296
2014
2014
Thinking Ahead - Implementing the NIST Cybersecurity Framework to Protect from Potential Legal Liability
Markus Rauschecker
2014
Corpus ID: 106856521
Failure by the U.S. Congress to pass meaningful cybersecurity legislation led the President to act within his power to address…
Expand
2014
2014
Incentives to Encourage Adoption of the NIST Cybersecurity Framework
Preston C. Stinson
2014
Corpus ID: 29401612
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE