Author:
Syamsuddin Irfan,Musaruddin Mustarum
Publisher
Springer International Publishing
Reference23 articles.
1. Kleinert, J.: Digital transformation. Empirica 48(1), 1–3 (2021). https://doi.org/10.1007/s10663-021-09501-0
2. Husák, M., Komárková, J., Bou-Harb, E., Čeleda, P.: Survey of attack projection, prediction, and forecasting in cyber security. IEEE Commun. Surv. Tutor. 21(1), 640–660 (2018)
3. Wahyudiwan, D.D.H., Sucahyo, Y.G., Gandhi, A.: Information security awareness level measurement for employee: case study at ministry of research, technology, and higher education. In: 2017 3rd International Conference on Science in Information Technology (ICSITech), pp. 654–658. IEEE (2017)
4. Setiadi, F., Sucahyo, Y.G., Hasibuan, Z.A.: An overview of the development Indonesia national cyber security. Int. J. Inform. Comput. Sci. 6, 108 (2012)
5. Yen, S.C., Lo, Y., Lee, A., Enriquez, J.: Learning Online, Offline, and in-between: comparing student academic outcomes and course satisfaction in face-to-face, online, and blended teaching modalities. Educ. Inf. Technol. 23, 2141–2153 (2018)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Analyzing the Social Media Advertising with ML Model: WEKA;2023 International Conference on New Frontiers in Communication, Automation, Management and Security (ICCAMS);2023-10-27
2. Live Memory Forensics Investigations: A Comparative Analysis;Journal of Advances in Information Technology;2023