[5] O. Kolomiyets, S. Bethard, and M. F. Moens, “Extracting narrative timelines as temporal dependency structures,” 50th Annu. Meet. Assoc. Comput. Linguist. ACL 2012 - Proc. Conf., vol. 1, no. February, pp. 88–97, 2012.
[6] R. Van Heerden, S. Von Soms, and R. Mooi, “Classification of cyber attacks in South Africa,” in 2016 IST-Africa Conference, ISTAfrica 2016, 2016, no. September.
[7] S. S. Bhuyan et al., “Transforming Healthcare Cybersecurity from Reactive to Proactive: Current Status and Future Recommendations,” J. Med. Syst., vol. 44, no. 5, 2020.
[8] S. E. Institute, CERT Resilience Management Model (CERT-RMM) Version 1.2, no. February. 2016.
[9] S. Hakak, W. Z. Khan, M. Imran, K. K. R. Choo, and M. Shoaib, “Have You Been a Victim of COVID-19-Related Cyber Incidents? Survey, Taxonomy, and Mitigation Strategies,” in IEEE Access, 2020, vol. 8, pp. 124134–124144
Follow Instagram @kompasianacom juga Tiktok @kompasiana biar nggak ketinggalan event seru komunitas dan tips dapat cuan dari Kompasiana
Baca juga cerita inspiratif langsung dari smartphone kamu dengan bergabung di WhatsApp Channel Kompasiana di SINI