Data Abuse in Cyberwarfare: Dissecting the Attack Model
![Data abuse](/-/media/images/isacadp/project/isaca/journal/2024/volume-6/j24v6_data-abuse.png?mw=550&hash=568A850B3AF868B8D98384806DD92B17)
Author: Aditya K Sood and Sherali Zeadally
Date Published: 27 November 2024
Read Time: 11 minutes
Date Published: 27 November 2024
Read Time: 11 minutes