Cited By
View all- Ma JAlias SHuang C(2024)Information security protection in hybrid officeProceedings of the 2024 3rd International Conference on Cyber Security, Artificial Intelligence and Digital Economy10.1145/3672919.3672924(21-25)Online publication date: 1-Mar-2024
- Tao SLiu YSun C(2024)Understanding information sensitivity perceptions and its impact on information privacy concerns in e-commerce servicesComputers and Security10.1016/j.cose.2023.103646138:COnline publication date: 1-Mar-2024
- Jemmali MBen Hmida ASarhan A(2023)A Novel Two-Routers Model Based on Category Constraints Secure Data-Dissemination-Aware Scheduling in Next-Generation Communication NetworksJournal of Network and Systems Management10.1007/s10922-023-09747-y31:3Online publication date: 30-Jun-2023
- Show More Cited By