Publisher
Springer International Publishing
Reference10 articles.
1. Hatleback, E.N.: The protoscience of cybersecurity. J. Defense Model. Simul. 15(1), 5–12 (2018)
2. Alzahrani, L.: Factors impacting users’ compliance with information security policies: an empirical study. Int. J. Adv. Comput. Sci. Appl. 12(10), 437–447 (2021)
3. Iqbal, Q., Ahmad, N.H., Nawaz, R.: Perceived information pollution: conceptualization, measurement, and nomological validity. Online Inform. Rev. 44(3), 705–722 (2020)
4. Tang, M., Jiang, L., Li, Z., Zhang, H.: Optimal ordering decision and information leakage preference under asymmetric forecast signal. Soft. Comput. 25(16), 10797–10812 (2021). https://doi.org/10.1007/s00500-021-05962-4
5. Ali, S.M., Elameer, A.S., Jaber, M.M.: IoT network security using autoencoder deep neural network and channel access algorithm. J. Intell. Syst. 31(1), 95–103 (2021)