![Cybersecurity and Artificial Intelligence Applications: A Bibliometric Analysis Based on Scopus Database | Mesopotamian Journal of CyberSecurity Cybersecurity and Artificial Intelligence Applications: A Bibliometric Analysis Based on Scopus Database | Mesopotamian Journal of CyberSecurity](https://mesopotamian.press/journals/public/journals/3/submission_117_117_coverImage_en_US.jpg)
Cybersecurity and Artificial Intelligence Applications: A Bibliometric Analysis Based on Scopus Database | Mesopotamian Journal of CyberSecurity
![The Emergence of Cyber-security as a policy driver | American Journal of International Law | Cambridge Core The Emergence of Cyber-security as a policy driver | American Journal of International Law | Cambridge Core](https://static.cambridge.org/content/id/urn%3Acambridge.org%3Aid%3Aarticle%3AS000293000024712X/resource/name/firstPage-S000293000024712Xa.jpg)
The Emergence of Cyber-security as a policy driver | American Journal of International Law | Cambridge Core
Centro de Documentación de Fundación MAPFRE - Cybersecurity of critical infrastructures: challenges and solutions
![Exploring Current Trends and Challenges in Cybersecurity: A Comprehensive Survey | International Journal on Recent and Innovation Trends in Computing and Communication Exploring Current Trends and Challenges in Cybersecurity: A Comprehensive Survey | International Journal on Recent and Innovation Trends in Computing and Communication](https://ijritcc.org/public/journals/1/submission_7590_7536_coverImage_en_US.png)
Exploring Current Trends and Challenges in Cybersecurity: A Comprehensive Survey | International Journal on Recent and Innovation Trends in Computing and Communication
![Cyber Security Concerns in Social Networking Service | International Journal of Communication Networks and Information Security (IJCNIS) Cyber Security Concerns in Social Networking Service | International Journal of Communication Networks and Information Security (IJCNIS)](https://www.ijcnis.org/public/journals/1/cover_issue_36_en_US.jpg)
Cyber Security Concerns in Social Networking Service | International Journal of Communication Networks and Information Security (IJCNIS)
![Lightweight Cyber Security for Decision Support in Information Security Risk Assessment | European Journal of Electrical Engineering and Computer Science Lightweight Cyber Security for Decision Support in Information Security Risk Assessment | European Journal of Electrical Engineering and Computer Science](https://ejece.org/public/journals/1/article_391_cover_en_US.jpg)
Lightweight Cyber Security for Decision Support in Information Security Risk Assessment | European Journal of Electrical Engineering and Computer Science
![Navigating the Cyber Threat Landscape: A Comprehensive Analysis of Attacks and Security in the Digital Age | Journal of Information Technology and Cyber Security Navigating the Cyber Threat Landscape: A Comprehensive Analysis of Attacks and Security in the Digital Age | Journal of Information Technology and Cyber Security](https://jurnal.untag-sby.ac.id/public/journals/48/cover_issue_604_en_US.jpg)
Navigating the Cyber Threat Landscape: A Comprehensive Analysis of Attacks and Security in the Digital Age | Journal of Information Technology and Cyber Security
![Exploring cybersecurity-related emotions and finding that they are challenging to measure | Humanities and Social Sciences Communications Exploring cybersecurity-related emotions and finding that they are challenging to measure | Humanities and Social Sciences Communications](https://media.springernature.com/lw685/springer-static/image/art%3A10.1057%2Fs41599-021-00746-5/MediaObjects/41599_2021_746_Fig6_HTML.png)
Exploring cybersecurity-related emotions and finding that they are challenging to measure | Humanities and Social Sciences Communications
![An efficient cyber security system based on flow-based anomaly detection using Artificial neural network | Mesopotamian Journal of CyberSecurity An efficient cyber security system based on flow-based anomaly detection using Artificial neural network | Mesopotamian Journal of CyberSecurity](https://mesopotamian.press/journals/public/journals/3/submission_65_65_coverImage_en_US.jpg)