![3 shows Top 15 affiliations as reported by authors who have published... | Download Scientific Diagram 3 shows Top 15 affiliations as reported by authors who have published... | Download Scientific Diagram](https://www.researchgate.net/publication/338965559/figure/fig3/AS:853689191395328@1580546772690/shows-Top-15-affiliations-as-reported-by-authors-who-have-published-documents-in-cyber.png)
3 shows Top 15 affiliations as reported by authors who have published... | Download Scientific Diagram
![International Journal of Information Security and Privacy (IJISP): 1930-1650, 1930-1669: Security & Forensics Journals | IGI Global International Journal of Information Security and Privacy (IJISP): 1930-1650, 1930-1669: Security & Forensics Journals | IGI Global](https://coverimages.igi-global.com/cover-images/covers/ijisp.png)
International Journal of Information Security and Privacy (IJISP): 1930-1650, 1930-1669: Security & Forensics Journals | IGI Global
![Electronics | Free Full-Text | Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review Electronics | Free Full-Text | Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review](https://pub.mdpi-res.com/electronics/electronics-11-00198/article_deploy/html/images/electronics-11-00198-g004.png?1642487372)
Electronics | Free Full-Text | Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review
![International Journal of Information and Computer Security (IJICS) Inderscience Publishers - linking academia, business and industry through research International Journal of Information and Computer Security (IJICS) Inderscience Publishers - linking academia, business and industry through research](https://www.inderscience.com/mobile/common/images/cover/scoverijics.jpg)