Author of the publication

Conflict spectrum: An empirical study of geopolitical cyber threats from a social network perspective.

, , , , , and . SNAMS, page 1-7. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward Reliable Mobile CrowdSensing Data Collection: Image Splicing Localization Overview., , , , , and . IWCMC, page 81-86. IEEE, (2023)An Overview of Funded Research Projects in The MENA Region on Intelligent Transportation Systems., , , , , , , , and . IWCMC, page 313-320. IEEE, (2023)STRisk: A Socio-Technical Approach to Assess Hacking Breaches Risk., , , , and . IEEE Trans. Dependable Secur. Comput., 20 (2): 1074-1087 (March 2023)Hercules Against Data Series Similarity Search., , , , and . Proc. VLDB Endow., 15 (10): 2005-2018 (2022)End-to-end LDA-based automatic weak signal detection in web news., , and . Knowl. Based Syst., (2021)Enhancing Cyber Threat Identification in Open-Source Intelligence Feeds Through an Improved Semi-Supervised Generative Adversarial Learning Approach With Contrastive Learning., , , and . IEEE Access, (2023)Beyond Locks and Keys: Structural Equation Modeling Based Framework to Explore Security Breaches Through the Lens of Crime Theories., , , and . NETYS, volume 14067 of Lecture Notes in Computer Science, page 96-101. Springer, (2023)Assessing Data Breach Factors Through Modern Crime Theory: A Structural Equation Modeling Approach., , , , and . IEEE Access, (2024)Deep reinforcement learning with external control: self-driving car application., and . SCA, page 58:1-58:7. ACM, (2019)Conflict spectrum: An empirical study of geopolitical cyber threats from a social network perspective., , , , , and . SNAMS, page 1-7. IEEE, (2021)