Document Type : Original Article
Authors
1 PhD student in Strategic Management of Cyber Space University and Higher Research Institute of National Defense and Strategic Research
2 Faculty Member of ICT Research Institute (ITRC)
3 Faculty Member of University and Higher Research Institute of National Defense and Strategic Research
4 PhD graduate of National Security Management University of National Defense and Strategic Research
Abstract
Keywords