Author:
Ravi Eslavath,Kumar Mummadi Upendra
Publisher
Springer Nature Switzerland
Reference62 articles.
1. Madan, S., Sofat, S., Bansal, D.: Tools and Techniques for collection and analysis of Internet-of-Things malware: a systematic state-of-art review. J. King Saud Univ. Comput. Inform. Sci. (In Press), KSU, Riyadh, KSA (2022)
2. Akter, S., Uddin, M.R., Sajib, S., et al.: Reconceptualizing cybersecurity awareness capability in the data-driven digital economy. Ann. Oper. Res. (2022). https://doi.org/10.1007/s10479-022-04844_8
3. Özer, B.M., Tepecik, A.: Cybersecurity, computer networks phishing, malware, ransomware, and social engineering anti-piracy reviews. In: 2021 3rd International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA). IEEE (2021)
4. El Yattioui, M.B., El Yattioui, Y.: Saudi Arabia and security in the Middle East: New challenges and opportunities. Handbook of Regional Conflict Resolution Initiatives in the Global South, pp. 43–58 (2022)
5. Jasmeet, K.: Taxonomy of malware: virus, worms and trojan. Int. J. Res. Anal Rev 6.1, 192–196 (2019)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献