Cyberterrorism definition patterns and mitigation strategies: A literature review
This paper aim to contribute to the body of knowledge on cyber terrorism, improves awareness of cyber terrorism definition, boundaries, potential targets, crime patterns and effective mitigation strategies through analysis of relevant literature on the issue produced in recent years....
à®®à¯à®´à¯ விளகà¯à®•à®®à¯
Saved in:
| தலைமை எழà¯à®¤à¯à®¤à®¾à®³à®°à¯à®•ளà¯: | , , |
|---|---|
| வடிவமà¯: | கடà¯à®Ÿà¯à®°à¯ˆ |
| மொழி: | English |
| வெளியீடபà¯à®ªà®Ÿà¯à®Ÿà®¤à¯: |
International Journal of Science and Research (IJSR)
2017
|
| பகà¯à®¤à®¿à®•ளà¯: | |
| நிகழà¯à®¨à®¿à®²à¯ˆ அணà¯à®•லà¯: | http://irep.iium.edu.my/54453/ http://irep.iium.edu.my/54453/ http://irep.iium.edu.my/54453/1/2017-Cyberterrorism%20Definition%20Patterns%20and%20Mitigation%20Strategies%20-%20A%20Lit.%20Review.pdf |
| கà¯à®±à®¿à®¯à¯€à®Ÿà¯à®•ளà¯: |
கà¯à®±à®¿à®šà¯à®šà¯Šà®²à¯ இணை
கà¯à®±à®¿à®¯à¯€à®Ÿà¯à®•ள௠இலà¯à®²à¯ˆ, இநà¯à®¤ கà¯à®±à®¿à®šà¯à®šà¯Šà®²à¯à®²à¯ˆ à®®à¯à®¤à®²à®¿à®²à¯ பதிவ௠செயà¯à®¯à¯à®™à¯à®•ளà¯!
|