Show simple item record

dc.contributor.author-
dc.date.accessioned2025-10-02T05:17:15Z
dc.date.available2025-10-02T05:17:15Z
dc.date.issued2018-12-03 11:26:50+00:00
dc.identifier.issn-
dc.identifier.uri2523-3246
dc.identifier.urihttp://digilib.fisipol.ugm.ac.id/repo/handle/15717717/35282
dc.description.abstract-
dc.format-
dc.language.isoEN
dc.publisherSpringerOpen
dc.relation.uri['https://cybersecurity.springeropen.com/about', 'https://cybersecurity.springeropen.com/', 'https://cybersecurity.springeropen.com/submission-guidelines']
dc.rightsCC BY
dc.subject['cybersecurity', 'network security', 'privacy technology', 'malware analysis', 'critical infrastructure security', 'cryptography', 'Computer engineering. Computer hardware', 'TK7885-7895', 'Electronic computers. Computer science', 'QA75.5-76.95']
dc.titleCybersecurity
dc.typeArticle
dc.identifier.oaioai:doaj.org/journal:c55dc29ee51f4aa795d91ccc9dd60052
dc.journal.info-


This item appears in the following Collection(s)

Show simple item record