Funder
Australian Research Council
Subject
Law,General Computer Science
Reference121 articles.
1. Protecting organizational competitive advantage: a knowledge leakage perspective;Ahmad;Comput. Secur.,2014
2. Teaching information security management: reflections and experiences;Ahmad;Inf. Manage. Comput. Secur.,2014
3. Profiling and classifying the behavior of malicious codes;Alazab;J. Syst. Softw.,2015
4. Cyber security deception;Almeshekah,2016
5. Netpreser Malware: Cyberspies Targeting Global Governments in New, Redefined Attacks;Ashok,2017
Cited by
81 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献