Publisher
Springer Science and Business Media LLC
Reference77 articles.
1. Anh N (2024) Hướng tới mục tiêu “cường quốc an toàn thông tin mạng”. VnEconomy. https://vneconomy.vn/huong-toi-muc-tieu-cuong-quoc-an-toan-thong-tin-mang.htm. Retrieved 19 Mar
2. Ansari MF, Dash B, Sharma P, Yathiraju N (2022) The impact and limitations of artificial intelligence in cybersecurity: a literature review. Int J Adv Res Comput Commun Eng
3. Bierens R, Klievink B, van Den Berg J (2017) A social cyber contract theory model for understanding national cyber strategies. In: Electronic government: 16th IFIP WG 8.5 international conference, St. Petersburg, Russia
4. Biggio B, Corona I, Maiorca D, Nelson B, Šrndić N, Laskov P, Roli F (2013a) Evasion attacks against machine learning at test time. In: Machine learning and knowledge discovery in databases: European conference, Prague, Czech Republic
5. Biggio B, Fumera G, Roli F (2013b) Security evaluation of pattern classifiers under attack. IEEE Trans Knowl Data Eng 26(4):984–996. https://doi.org/10.1109/TKDE.2013.57