has been cited by the following article(s):
[1]
|
South African Institute of Computer Scientists and Information Technologists
Communications in Computer and Information Science,
2023
DOI:10.1007/978-3-031-39652-6_13
|
|
|
[2]
|
Subspace-Based Anomaly Detection for Large-Scale Campus Network Traffic
Journal of Applied Mathematics,
2023
DOI:10.1155/2023/8489644
|
|
|
[3]
|
Measuring economic resilience for the CEE and Black Sea countries in the framework of comprehensive defense
Security and Defence Quarterly,
2023
DOI:10.35467/sdq/175379
|
|
|
[4]
|
The Impact of the War in Ukraine on the Information Security of the European Union’s Banking Industry – A Case Study of Hungary And Slovakia
CONTEMPORARY MILITARY CHALLENGES,
2023
DOI:10.2478/cmc-2023-0020
|
|
|
[5]
|
Cybersecurity Enterprises Policies: A Comparative Study
Sensors,
2022
DOI:10.3390/s22020538
|
|
|
[6]
|
Information Security Risk Management Model for Big Data
Advances in Multimedia,
2022
DOI:10.1155/2022/3383251
|
|
|
[7]
|
Attributes impacting cybersecurity policy development: An evidence from seven nations
Computers & Security,
2022
DOI:10.1016/j.cose.2022.102820
|
|
|