Author:
Houmz Abdellah,Cherqi Othmane,Zkik Karim,Benbrahim Houda
Publisher
Springer Nature Switzerland
Reference22 articles.
1. Konceptanalytics and R. a. M. ltd.: Global Cyber Security Market (By Segment, EndUsers & Region): Insights & Forecast with Potential Impact of COVID-19 (2021–2025). https://www.researchandmarkets.com/reports/5510975/global-cyber-security-market-by-segmentend (2021)
2. Jumratjaroenvanit, A., Teng-Amnuay, Y.: Probability of attack based on system vulnerability life cycle. In: 2008 International Symposium on Electronic Commerce and Security. IEEE, pp. 531–535 (2008)
3. Allodi, L., Massacci, F.: Comparing vulnerability severity and exploits using case-control studies. ACM Trans. Inf. Syst.Sec. 17(1), 1:1–1:20 (2014)
4. Lecture Notes in Computer Science;E Raftopoulos,2015
5. Griffioen, H., Doerr, C.: Discovering collaboration: unveiling slow, distributed scanners based on common header field patterns. In: NOMS 2020 2020 IEEE/IFIP Network Operations and Management Symposium, pp. 1–9 (2020)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Evaluating Wi-Fi Security Through Wardriving: A Test-Case Analysis;2023 10th International Conference on Wireless Networks and Mobile Communications (WINCOM);2023-10-26