Publisher
Springer Nature Switzerland
Reference32 articles.
1. Pawlicka, A., Choraś, M., Pawlicki, M.: The stray sheep of cyberspace aka the actors who claim they break the law for the greater good. Pers. Ubiquit. Comput. 25(5), 843–852 (2021)
2. Kozik, R., Choraś, M.: Current cyber security threats and challenges in critical infrastructures protection. In: 2013 Second International Conference on Informatics & Applications (ICIA), pp. 93–97 (2013)
3. E. Commission, A european strategy for data.’ https://digital-strategy.ec.europa.eu/en/policies/strategy-data
4. Younus, Z., Alanezi, M.: A survey on network security monitoring: tools and functionalities. Mustansiriyah J. Pure Appli. Sci. 1(2), 55–86 (2023)
5. Pawlicki, M., Pawlicka, A., Kozik, R., Choraś, M.: The survey and meta-analysis of the attacks, transgressions, countermeasures and security aspects common to the cloud, edge and iot.Neurocomputing, 126533 (2023)