Author:
Khanam Momtaj,Garces Edwin,Daim Tugrul U.,Alsoubaie Fayez
Publisher
Springer International Publishing
Reference86 articles.
1. Aguilés, A. V., Vieira, M. M., Hernàndez i Dobon, F. J., & de Almeida, A. N. (2012). Más que abandono de estudios, trayectorias de reubicación universitaria: Aproximación comparada al caso español y portugués. Revista Lusofona de Educacao, 21, 139–162. https://doi.org/10.1787/eag-2011-en
2. Albahar, M. (2019). Cyber attacks and terrorism: A twenty-first century conundrum. Science and Engineering Ethics, 25(4), 993–1006. https://doi.org/10.1007/s11948-016-9864-0
3. Al-Dawod, F. L., Stefanska, B., & Yakob, R. (2021). The importance of risk awareness in cybersecurity among companies: A perspective on the role of top management. [Online]. Available: www.liu.se
4. Almalawi, A., Tari, Z., Fahad, A., & Yi, X. (2021). SCADA data-driven anomaly detection. In SCADA security: Machine learning concepts for intrusion detection and prevention, pp. 87–118, https://doi.org/10.1002/9781119606383.CH5
5. Arnaboldi, V., Conti, M., la Gala, M., Passarella, A., & Pezzoni, F. (2016). Ego network structure in online social networks and its impact on information diffusion. Computer Communications, 76, 26–41. https://doi.org/10.1016/j.comcom.2015.09.028