Publisher
Springer International Publishing
Reference40 articles.
1. Leizerovych, R., Kondratenko, G., Sidenko, I., Kondratenko, Y.: IoT-complex for monitoring and analysis of motor highway condition using artificial neural networks. In: 2020 IEEE 11th International Conference on Dependable Systems, Services and Technologies (DESSERT), Kyiv, Ukraine, pp. 207–212 (2020). https://doi.org/10.1109/DESSERT50317.2020.9125004
2. Eset. Spyware. https://help.eset.com/glossary/en-US/spyware.html. Accessed 20 Jan 2021
3. Avast. Spyware: Detection, Prevention, and Removal. https://www.avast.com/c-spyware. Accessed 20 Jan 2021
4. Securelist. New trends in the world of IoT threats. https://securelist.com/new-trends-in-the-world-of-iot-threats/87991/. Accessed 20 Jan 2021
5. Sokol, P., Zuzčák, M., Sochor, T.: Definition of attack in the context of low-level interaction server honeypots. In: Park, J., Stojmenovic, I., Jeong, H., Yi, G. (eds.) Computer Science and its Applications, vol. 330, pp. 499–504. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-45402-2_74