Author:
Malkawi Malek,Alhajj Reda
Publisher
Springer Nature Switzerland
Reference49 articles.
1. Gamundani, A.M., Nekare, L.M.: A review of new trends in cyber attacks: a zoom into distributed database systems. In: 2018 IST-Africa Week Conference (IST-Africa), p. 1. IEEE, Piscataway (2018)
2. Arnaldy, D., Perdana, A.R.: Implementation and analysis of penetration techniques using the man-in-the-middle attack. In: 2019 2nd International Conference of Computer and Informatics Engineering (IC2IE), pp. 188–192. IEEE, Piscataway (2019)
3. Zhu, N., Chen, X., Zhang, Y.: Construction of overflow attacks based on attack element and attack template. In: 2011 Seventh International Conference on Computational Intelligence and Security, pp. 540–544. IEEE, Piscataway (2011)
4. Kang, S., Qiaozhong, D., WeiQiang, Z.: Space information security and cyberspace defense technology. In: 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing, pp. 1509–1511. IEEE, Piscataway (2013)
5. Daria, G., Massel, A.: Intelligent system for risk identification of cybersecurity violations in energy facility. In: 2018 3rd Russian-Pacific Conference on Computer Technology and Applications (RPC), pp. 1–5. IEEE, Piscataway (2018)