-
1
Influence Cascades: Entropy-Based Characterization of Behavioral Influence Patterns in Social Media
Published 2021-01-01Subjects: Get full text
Article -
2
Strategic PMU placement to alleviate power system vulnerability against cyber attacks
Published 2021-12-01Subjects: “…cyber vulnerability…”
Get full text
Article -
3
CYBERSPACE RISKS AND THREATS TO CRITICAL INFORMATION INFRASTRUCTURE
Published 2011-12-01Subjects: Get full text
Article -
4
A perfect storm: Digital twins, cybersecurity, and general contracting firms
Published 2024-04-01Subjects: Get full text
Article -
5
Actual and future digital threats and their impact on civil and military cybersecurity management
Published 2022-10-01Subjects:Article -
6
A Machine Learning Approach for the NLP-Based Analysis of Cyber Threats and Vulnerabilities of the Healthcare Ecosystem
Published 2023-01-01Subjects: Get full text
Article