International Journal of Computer & Software Engineering Volume 2 (2017), Article ID 2:IJCSE-111, 2 pages
https://doi.org/10.15344/2456-4451/2017/111
https://doi.org/10.15344/2456-4451/2017/111
Commentary
Control of Knowledge and the Cyber Threat
References
- Hauptman A, Sharan Y (2013) Foresightof Evolving Security Threats Posed by Emerging Technologies", Foresight, October 2013.
- Gordon T, Sharan Y, Florescu E (2015) Prospects for Lone Wolf and SIMAD terrorism, Technological Forecasting and Social Change. Volume 95: 234–251.