Loading...
The system can't perform the operation now. Try again later.
Articles
Case law
Profiles
My profile
My library
Metrics
Alerts
Settings
Get journal articles
Get journal articles
Profiles
My profile
My library
Reza Montasari
Swansea University
Verified email at swansea.ac.uk
Cited by 790
Digital Forensics
Cyber Security
Cyber Threats
Cyber Terrorism
Cyber Law
Tal Pavel
The Institute for Cyber Policy Studies
Verified email at cybureau.org
Cited by 89
Cyber security
Cyber threats
Cyber policy
Cyber terrorism
Karan Goenka
Masters in Cyber Security, Northeastern University
Verified email at northeastern.edu
Cited by 15
Information Security
Cyber Security
Cyber threats
Cloud Security
threat modeling
Aleksandra Radomska
Wojskowa Akademia Techniczna
Verified email at wat.edu.pl
Cited by 7
air traffic management
aviation safety
space security
militarization and weaponization of outer …
cyber threats
Swati Bhat
DYPIMR
Verified email at dypvp.edu.in
Cited by 3
Cyber Threats
Blockchain
Mariam Munsif Mir
Griffith University
Verified email at griffithuni.edu.au
Machine Learning
Cyber Security
Cyber Threats
Device Fingerprinting
Privacy
Terms
Help
About Scholar
Search help