Author:
Harthy Khoula Al,Shah Nazaraf
Publisher
Springer International Publishing
Reference23 articles.
1. Jones, J.: Beginner’s Guide to BYOD (Bring Your Own Device) (2012). Accessed 9 Feb 2014
2. Brooks, T.: Classic enterprise IT: the castle approach. Netw. Secur. 2013(6), 14–16 (2013)
3. Eslahi, M., Salleh, R., Anuar, N.B.: Bots and botnets: an overview of characteristics, detection and challenges. In: 2012 IEEE International Conference on Control System, Computing and Engineering. IEEE (2012)
4. Ghosh, A., Gajar, P.K., Rai, S.: Bring your own device (BYOD): security risks and mitigating strategies. J. Glob. Res. Comput. Sci. 4(4), 62–70 (2013)
5. Ismail, K.A., Singh, M.M., Mustaffa, N., Keikhosrokiani, P., Zulkefli, Z.: Security strategies for hindering watering hole cyber crime attack. Procedia Comput. Sci. 124, 656–663 (2017)