Funder
Al-Balqa’ Applied University
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference29 articles.
1. Asabere, N.Y., Fiamavle, E., Agyiri, J., Torgby, W.K., Dzata, J.E., Doe, N.P.: Sarcp: exploiting cyber-attack prediction through socially-aware recommendation. Int. J. Decis. Support. Syst. Technol. (2022). https://doi.org/10.4018/IJDSST.286691
2. Albasheer, H., Md Siraj, M., Mubarakali, A., Elsier Tayfour, O., Salih, S., Hamdan, M., Khan, S., Zainal, A., Kamarudeen, S.: Cyber-attack prediction based on network intrusion detection systems for alert correlation techniques: a survey. Sensors 22(4), 1494 (2022)
3. Parliament of Australia: Australian parliament the report of the inquiry into cybercrime (2021). http://www.aph.gov.au/house/committee/coms/cybercrime/report/full_report.pdf. Accessed 30 Nov 2021
4. Jang-Jaccard, J., Nepal, S.: A survey of emerging threats in cybersecurity. J. Comput. Syst. Sci. 80(5), 973–993 (2014). https://doi.org/10.1016/j.jcss.2014.02.005
5. Souri, A., Hosseini, R.: A state-of-the-art survey of malware detection approaches using data mining techniques. Hum.-Centric Comput. Inf. Sci. (2018). https://doi.org/10.1186/s13673-018-0125-x
Cited by
24 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献