Cited By
View all- Khan RAkbar MRafi SAlmagrabi AAlzahrani M(2023)Evaluation of requirement engineering best practices for secure software development in GSD: An ISM analysisJournal of Software: Evolution and Process10.1002/smr.2594Online publication date: 4-Jul-2023
- Verma PBreslin JO’Shea D(2022)FLDID: Federated Learning Enabled Deep Intrusion Detection in Smart Manufacturing IndustriesSensors10.3390/s2222897422:22(8974)Online publication date: 19-Nov-2022
- Parkin SChua YGroß TViganò L(2022)A cyber-risk framework for coordination of the prevention and preservation of behavioursJournal of Computer Security10.3233/JCS-21004730:3(327-356)Online publication date: 1-Jan-2022
- Show More Cited By