Author:
Sharma Dilli Prasad,Habibi Lashkari Arash,Parizadeh Mona
Publisher
Springer Nature Switzerland
Reference25 articles.
1. Arachchilage, N. A., & Love, S. (2014). Security awareness of computer users: A phishing threat avoidance perspective. Computers in Human Behavior, 38, 304–312. https://doi.org/10.1016/j.chb.2014.05.046
2. Arafin, M. T., & Qu, G. (2021). Hardware-based authentication applications. In B. Halak (Ed.), Authentication of embedded devices: Technologies, protocols and emerging applications (pp. 145–181). Springer International Publishing. https://doi.org/10.1007/978-3-030-60769-2_6
3. Bahache, A. N., Chikouche, N., & Mezrag, F. (2022). Authentication schemes for healthcare applications using wireless medical sensor networks: A survey. SN Computer Science., 3, 382. https://doi.org/10.1007/s42979-022-01300-z
4. Cooper, M. J., & Schaffer, K. B. (2019, March). Security requirements for cryptographic modules, Federal Inf. Process. Stds. (NIST FIPS). National Institute of Standards and Technology (NIST). National Institute of Standards and Technology (NIST). https://doi.org/10.6028/NIST.FIPS.140-3.
5. Costa, D. (2017, March). CERT definition of 'Insider Threat'–updated. Carnegie Mellon University, software engineering Institute's insights (blog). Retrieved 7 16, 2023, from https://insights.sei.cmu.edu/blog/cert-definition-of-insider-threat-updated/