Author:
Nirmal K.,Janet B.,Kumar R.
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference38 articles.
1. Nirmal K, Janet B, Kumar R (2015) Phishing - the threat that still exists, 2015 International Conference on Computing and Communications Technologies (ICCCT), Chennai, pp. 139-143. PhishTank: an anti-phishing site, LLC OpenDNS, San Francisco, CA, USA
2. Anti-Phishing Working Group. [Online]. Available: http://www.antiphishing.org. Accessed 20 Mar 2020
3. Tweneboah-Koduah S, Skouby KE, Tadayoni R (2017) Cyber security threats to IoT applications and service domains. Wirel Pers Commun 95:169–185. https://doi.org/10.1007/s11277-017-4434-6
4. Matuszak G, Bell G, Le D (2015). Security and the IoT ecosystem. KPMG, December 2015, 132631–G
5. Quashie Azasoo J, Tweneboah-Koduah S (2016). Cybersecurity architecture in smart metering systems. In smart living and privacy. Unpublished paper. CMI Annual Conference, Copenhagen, Denmark
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献