Author:
Karabacak Bilge,Yildirim Sevgi Ozkan,Baykal Nazife
Funder
Turkish Ministry of Development
Subject
Information Systems and Management,Computer Science Applications,Safety, Risk, Reliability and Quality,Modeling and Simulation
Reference44 articles.
1. ABI Research, Global Cybersecurity Index: Conceptual Framework, London, United Kingdom, 2014.
2. Booz Allen Hamilton, Cyber Power Index: Findings and Methodology, McLean, Virginia, 2011.
3. A. Chan, E. Yung, P. Lam, C. Tam and S. Cheung, Application of Delphi method in selection of procurement systems for construction projects, Construction Management and Economics, vol. 19(7), pp. 699–718, 2001.
4. P. Cichonski, T. Millar, T. Grance and K. Scarfone, Computer Security Incident Handling Guide: Recommendations of the National Institute of Standards and Technology, Special Publication 800-61, Revision 2, National Institute of Standards and Technology, Gaithersburg, Maryland, 2012.
5. W. Clinton, Executive Order 13010 – Critical Infrastructure Protection, The White House, Washington, DC, 1996.
Cited by
22 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Aviation Cybersecurity;Advances in Mechatronics and Mechanical Engineering;2024-03-04
2. Exploring the Intersection of Cyber Security and Digital Diplomacy;Advances in Logistics, Operations, and Management Science;2024-02-02
3. Teacher-student interaction modes in smart classroom based on lag sequential analysis;Education and Information Technologies;2024-01-19
4. Zt-Nids: Zero Trust - Network Intrusion Detection System Validation Based on Attack Simulations;2024
5. Protecting Critical Infrastructure: Strategies for Managing Cybersecurity Risks in Nuclear Fusion Facilities;2023 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom);2023-12-21