Author:
Acev David,Nadzinski Gorjan,Rakovic Valentin,Risteski Aleksandar
Publisher
Springer International Publishing
Reference32 articles.
1. Park, K.: The internet as a complex system. The internet as a large-scale complex system (2005)
2. Pitts, V.: Cyber crimes: history of world’s worst cyber attacks. Alpha Editions (2016)
3. Bendovschi, A.: Cyber-attacks–trends, patterns and security countermeasures. Proc. Econ. Financ. 28, 24–31 (2015)
4. Bar-Yam, Y.: General features of complex systems. Encycl. Life Support Syst. 1, 1–10 (2002)
5. Dimirovski, G.M.: Complex systems: relationships between control, communications and computing. In: Studies in Systems, Decision and Control. Springer (2016)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Identification and Classification of Malicious and Benign URL using Machine Learning Classifiers;2023 7th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC);2023-10-11