Citation sources

Updated weekly. Details via Crossref
Crossref Scopus Google Scholar
20 19 Search
2026
CYBER ATTACKS: ARE THEY THE TERRORISM OF THE FUTURE?
Yeditepe Üniversitesi Hukuk Fakültesi Dergisi
2026
A Survey of SIR‐Based Differential Epidemic Models for Control and Security Against Malware Propagation in Computer Networks
SECURITY AND PRIVACY
2026
Lecture Notes in Electrical Engineering
2026
Augmenting software quality assurance with AI and automation using PyTest-BDD
Automated Software Engineering
2025
Enhancing national security: a multidimensional situational awareness model for emerging economic crime prevention
International Journal of Information Security
2025
2025 International Conference on Innovations in Intelligent Systems: Advancements in Computing, Communication, and Cybersecurity (ISAC3)
2025
UN Cybercrime Convention: Implementing the Mutual Legal Assistance in the Digital Age
Journal of Digital Technologies and Law
2025
Impact of Cyber Security on Network Traffic <p><span></span></p>
SSRN Electronic Journal
2025
Blockchain-enhanced electoral integrity: a robust model for secure digital voting systems in Oman
F1000Research
2025
Smart Grid Systems: Addressing Privacy Threats, Security Vulnerabilities, and Demand–Supply Balance (A Review)
Energies
2025
Blockchain-enhanced electoral integrity: a robust model for secure digital voting systems in Oman
F1000Research
2025
Intrusion detection in smart grids using artificial intelligence-based ensemble modelling
Cluster Computing
2025
A survey of cyber threat attribution: Challenges, techniques, and future directions
Computers & Security
2025
International Encyclopedia of Public Health
2025
Technology, Geopolitics, and the Transformation of International Political Economy
2024
Navigating perilous seas: unmasking online banking frauds, perceived usefulness, fear of cybercrime and distrust in online banking
Safer Communities
2024
2024 IEEE 15th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)
2024
Evolution of Cyberterrorism: Challenges and Solutions
Uluslararası İlişkiler Çalışmaları Dergisi
2024
Evaluating modern intrusion detection methods in the face of Gen V multi-vector attacks with fuzzy AHP-TOPSIS
PLOS ONE
2024
Advances in Information Security, Privacy, and Ethics