Author of the publication

Antecedents of Cybersecurity Implementation: A Study of the Cyber-Preparedness of U.K. Social Enterprises.

, , , , and . IEEE Trans. Engineering Management, 69 (6): 3826-3837 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comparison and Detection Analysis of Network Traffic Datasets Using K-Means Clustering Algorithm., , , and . J. Inf. Knowl. Manag., 19 (3): 2050026:1-2050026:22 (2020)Unveiling the Stealthy Threat: Analyzing Slow Drift GPS Spoofing Attacks for Autonomous Vehicles in Urban Environments and Enabling the Resilience., , , and . CoRR, (2024)Antecedents of Cybersecurity Implementation: A Study of the Cyber-Preparedness of U.K. Social Enterprises., , , , and . IEEE Trans. Engineering Management, 69 (6): 3826-3837 (2022)COBALT: A Content-Based Similarity Approach for Link Discovery over Geospatial Knowledge Graphs, , , and . SEMANTiCS, (2023)Protecting Image-classifiers from Adversarial Attacks using an Adaptive Clustering Buffer-based Detection., , , and . GCAIoT, page 94-99. IEEE, (2022)Emerging Relaxation and DDPM D/A Converters: Overview and Perspectives., , , and . MWSCAS, page 1-6. IEEE, (2022)A wearable sensor based multi-criteria-decision-system for real-time seizure detection., , , , and . EMBC, page 2377-2380. IEEE, (2017)Limit-Cycle Free, Digitally-Controlled Boost Converter Based on DDPWM., , and . IEEE Access, (2023)Benchmarking Modern Named Entity Recognition Techniques for Free-text Health Record De-identification., , and . CoRR, (2021)A Stiffness-Changeable Soft Finger Based on Chain Mail Jamming., , , , and . ICRA, page 7405-7411. IEEE, (2023)