Թվային անվտանգության կանոնակարգ (Armenian Wikipedia)

Analysis of information sources in references of the Wikipedia article "Թվային անվտանգության կանոնակարգ" in Armenian language version.

refsWebsite
Global rank Armenian rank
68th place
88th place
446th place
1,388th place
2nd place
4th place
1st place
1st place
210th place
408th place
low place
low place
low place
low place
102nd place
2,318th place
5,433rd place
7,621st place
355th place
155th place
11th place
428th place
703rd place
1,284th place
1,353rd place
2,709th place
low place
low place
2,229th place
4,210th place
low place
low place
798th place
low place
low place
low place
1,216th place
1,404th place
low place
low place
2,714th place
5,212th place
low place
low place
low place
low place
3,286th place
4,772nd place
1,347th place
3,723rd place
low place
low place
low place
low place
low place
low place
low place
low place
low place
low place
low place
low place

archives.gov

obamawhitehouse.archives.gov

circleid.com

dataprotectionreport.com

deloitte.com

www2.deloitte.com

digitaleurope.org

doi.org

  • Kianpour, Mazaher; Raza, Shahid (2024). «More than malware: unmasking the hidden risk of cybersecurity regulations». International Cybersecurity Law Review. 5: 169–212. doi:10.1365/s43439-024-00111-7. hdl:11250/3116767.
  • Hopcraft, Rory (2018). «Effective maritime cybersecurity regulation - the case for a cyber code». Journal of Indian Ocean Region. 14 (3): 354–366. doi:10.1080/19480881.2018.1519056. S2CID 158311827.
  • Purser, Steve (2014). «Standards for Cyber Security». In Hathaway, Melissa E. (ed.). Best Practices in Computer Network Defense: Incident Detection and Response. Nato Science for Peace and Security Series - D: Information and Communication Security. Vol. 35. IOS Press. doi:10.3233/978-1-61499-372-8-97. ISBN 978-1-61499-372-8.

eclipse-foundation.blog

eclipse.org

blogs.eclipse.org

eugdpr.org

euractiv.com

europa.eu

enisa.europa.eu

eur-lex.europa.eu

ec.europa.eu

eiopa.europa.eu

financialexpress.com

computer.financialexpress.com

ft.com

genorma.com

govtrack.us

gwu.edu

scholarship.law.gwu.edu

handle.net

hdl.handle.net

  • Kianpour, Mazaher; Raza, Shahid (2024). «More than malware: unmasking the hidden risk of cybersecurity regulations». International Cybersecurity Law Review. 5: 169–212. doi:10.1365/s43439-024-00111-7. hdl:11250/3116767.

iclg.com

ico.org.uk

internetsociety.org

lawsociety.ie

nist.gov

csrc.nist.gov

out-law.com

politico.eu

pwc.com

pyfound.blogspot.com

semanticscholar.org

api.semanticscholar.org

ssrn.com

papers.ssrn.com

  • Schooner, Steven L.; Berteau, David J. (2012-03-01). Emerging Policy and Practice Issues (2011). Rochester, NY: Social Science Research Network. SSRN 2014385.

theregister.co.uk

web.archive.org

wikipedia.org

en.wikipedia.org