Cited By
View all- Alhejaili M(2024)Securing the Kingdom’s e-commerce frontier: Evaluation of Saudi Arabia’s cybersecurity legal frameworksJournal of Governance and Regulation10.22495/jgrv13i2siart413:2, special issue(275-286)Online publication date: 28-May-2024
- Dunnett KPal SJadidi ZDedeoglu VJurdak R(2024)Priv-Share: A privacy-preserving framework for differential and trustless delegation of cyber threat intelligence using blockchainComputer Networks10.1016/j.comnet.2024.110686252(110686)Online publication date: Oct-2024
- Fischer DSauerwein CWerchan MStelzer D(2023)An Exploratory Study on the Use of Threat Intelligence Sharing Platforms in Germany, Austria and SwitzerlandProceedings of the 18th International Conference on Availability, Reliability and Security10.1145/3600160.3600185(1-7)Online publication date: 29-Aug-2023
- Show More Cited By