Author:
Malyukov V.,Lakhno V.,Malyukova I.,Kryvoruchko O.,Desiatko A.,Tsiutsiura M.
Publisher
Springer Nature Switzerland
Reference27 articles.
1. Lallie, H.S., et al.: Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Comput. Secur. 105, 102248 (2021)
2. Upadhyay, N.K., Rathee, M.: Cyber security in the age of Covid-19: a timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Med., Law Soc. 15(1), 89–106 (2022)
3. Hallman, R.A., et al.: Determining a return on investment for cybersecurity technologies in networked critical infrastructures. Int. J. Organ. Collect. Intell. (IJOCI) 11(2), 91–112 (2021)
4. Kalderemidis, I., Farao, A., Bountakas, P., Panda, S., Xenakis, C.: GTM: game theoretic methodology for optimal cybersecurity defending strategies and investments. In: Proceedings of the 17th International Conference on Availability, Reliability and Security, pp. 1–9 (2022)
5. Garg, V.: Covenants without the sword: market incentives for cybersecurity investment. Available at SSRN 3896578 (2021)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Methodology for Developing an Information System for Internal Audit Support;2024 IEEE 4th International Conference on Smart Information Systems and Technologies (SIST);2024-05-15