Publisher
Springer International Publishing
Reference10 articles.
1. Ozkan, B.E., Bulkan, S.: Hidden risks to cyberspace security from obsolete COTS software. In: 2019 11th International Conference on Cyber Conflict (CyCon) (2019)
2. Rahman, M.: CERTIFICATE OF APPRECIATION Mr. MOIDUR RAHMAN As the keynote speaker on International Seminar on “Network Security and Cryptography” organized by the Network Security and Cryptography (2021)
3. Ashoor, A.S., Kazem, A., Gore, S.: An interactive network security for evaluating linear regression models in cancer mortality analysis and self-correlation of errors by using Durbin-Watson tests in Babylon/Iraq. J. Phys. Conf. Ser. 1804(1), 012127 (2021)
4. Einy, S., Oz, C., Navaei, Y.D.: The anomaly-and signature-based IDS for network security using hybrid inference systems. Math. Probl. Eng. 2021(9), 1–10 (2021)
5. Majeed, A., ur Rasool, R., Ahmad, F., Alam, M., Javaid, N.: Near-miss situation based visual analysis of SIEM rules for real time network security monitoring. J. Ambient Intell. Humaniz. Comput. 10(4), 1509–1526 (2018). https://doi.org/10.1007/s12652-018-0936-7