//-->
Defining and computing a value based cyber-security measure
Aissa, Anis Ben, (2012)
Experimental Analysis of Document Verification Scheme Using Blockchain Logics Over Secured Cloud Environment
Abd El-Aziz, Rasha M., (2020)
Introduction to the special issue on cyber security and management
Sheldon, Frederick T., (2012)