3 works on record
Information Security of Highly Critical Wireless Networks
Machine Learning for Cyber Agents
Cyber Arms