1. Effectiveness of Artificial;Alhayani;A smart farming IoT model.
2. Cyber-Security and Threat Politics
3. Quick method for identifying cyberattacks;Komar
4. leveraging information exchange about cyber security to obtain additional knowledge;Fransen;comprehension of the potential effects of cyberthreats and events, Information technology and electronics
5. The effects of cyberattacks on society and psychology;Bada;Cyber Threats that Are Emerging and Cognitive Vulnerabilities