This work is licensed under the Creative Commons Attribution 4.0 International License.
Ghiasi, M., Wang, Z., Mehrandezh, M., Niknam, T., Dehghani, M., & Ghadimi, N. (2023). A comprehensive review of cyber-attacks and defense mechanisms for improving security in smart grid energy systems: past, present and future. Electric Power Systems Research.Search in Google Scholar
Pargoo, N. S., & Ilbeigi, M. (2023). A scoping review for cybersecurity in the construction industry. Journal of management in engineering.Search in Google Scholar
Shortridge, K., & Dykstra, J. (2023). Opportunity cost and missed chances in optimizing cybersecurity. Communications of the ACM.Search in Google Scholar
Yan, F., Wen, S., Nepal, S., Paris, C., & Xiang, Y. (2022). Explainable machine learning in cybersecurity: a survey. International Journal of Intelligent Systems, 37(12), 12305-12334.Search in Google Scholar
Ignaczak, L., Goldschmidt, G., Cristiano André Da Costa, & Righi, R. D. R. (2022). Text mining in cybersecurity: a systematic literature review. ACM computing surveys.Search in Google Scholar
Haleem, A., Javaid, M., Singh, R. P., Rab, S., & Suman, R. (2022). Perspectives of cybersecurity for ameliorative industry 4.0 era: a review-based framework. Industrial Robot(3), 49.Search in Google Scholar
Tsao, K. Y., Girdler, T., & Vassilakis, V. G. (2022). A survey of cyber security threats and solutions for uav communications and flying ad-hoc networks. Ad hoc networks(Aug.), 133.Search in Google Scholar
Latino, M. E., & Menegoli, M. (2022). Cybersecurity in the food and beverage industry: a reference framework. Computers in Industry(141-), 141.Search in Google Scholar
Corallo, A., Lazoi, M., Lezzi, M., & Luperto, A. (2022). Cybersecurity awareness in the context of the industrial Internet of things: a systematic literature review. Computers in Industry(137-), 137.Search in Google Scholar
Pawlicki, M., Kozik, R., & Choras, M. (2022). A survey on neural networks for (cyber-) security and (cyber-) security of neural networks. Neurocomputing.Search in Google Scholar
Rana, P., & Patil, B. P. (2023). Cyber security threats in iot: a review. Journal of high speed networks.Search in Google Scholar
Shillair, R., Esteve-Gonzalez, P., Dutton, W. H., Creese, S., Nagyfejeo, E., & Von Solms, B. (2022). Cyb ersecurity e ducation, awareness raising, and training initiatives: national level evidence-based results, challenges, and promise. Computers & Security(119-), 119.Search in Google Scholar
Karjalainen, M., & Ojala, A. L. (2023). Authentic learning environments for in-service training in cybersecurity: a qualitative study. International journal of continuing engineering education and life-long learning.Search in Google Scholar
Kaur, R., Gabrijelcic, D., & Klobucar, T. (2023). Artificial intelligence for cybersecurity: literature review and future research directions. Information Fusion.Search in Google Scholar
Parker, S., Wu, Z., & Christofides, P. D. (2023). Cybersecurity in process control, operations, and supply chain. Computers & Chemical Engineering, 171, 108169-.Search in Google Scholar
O’Brien, P. (2022). Five things to know about cybersecurity in process safety. Chemical Engineering Progress(12), 118.Search in Google Scholar
Wang, X., & Liu, J. (2023). A novel feature integration and entity boundary detection for named entity recognition in cybersecurity. Knowledge-based systems.Search in Google Scholar
Jana, D. P., Shukla, A. M., & Gupta, S. (2022). K-means algorithm-based detection for wavelength division multiplexed ook pd-noma system over turbulent optical channel. Optical Engineering, 61(3), -.Search in Google Scholar
Moodi, F., & Saadatfar, H. (2022). An improved k-means algorithm for big data. IET Software, 16(1).Search in Google Scholar