publication venue for Identifying key relationships between nation-state cyberattacks and geopolitical and economic factors: A model. 2022:1-11. 2022 Android Malware Characterization Using Metadata and Machine Learning Techniques. 2018:1-11. 2018 Cybersecurity Vulnerability Analysis of the PLC PRIME Standard. 2017:1-19. 2017 Weaknesses of fingerprint-based mutual authentication protocol. 8:2124-2134. 2015 Weaknesses in a new ultralightweight RFID authentication protocol with permutation-RAPP. 7:945-949. 2014