Mapping of cyber-security through domains of specialisations, sectorial dimensions and technological applications.
Technologies and applications
Share this page
We use text mining and analysis tools to extract information from online data, including traditional or social media, or from large public or proprietary document sets.
Published on Knowledge4Policy by the Text Mining team