Author:
Sreerag M.,Sethumadhavan M.,Amritha P. P.
Reference10 articles.
1. Rajesh, M., Sreevidya, B.: Vulnerability analysis of real-time operating systems for wireless sensor networks. In: Advanced Computing and Intelligent Engineering, pp. 449–460. Springer (2020)
2. Kumar, B.K., Raj, N., Dhivvya, J.P., Muralidharan, D.: Fixing network security vulnerabilities in local area network. In: International Conference on Trends in Electronics and Informatics, pp. 1349–1354. IEEE (2019)
3. Achuthan, K., SudhaRavi, S., Kumar, R., Raman, R.: Security vulnerabilities in open source projects: an India perspective. In: International Conference on Information and Communication Technology, pp. 18–23. IEEE (2014)
4. Parimi, M.R.: Critical analysis of software vulnerabilities through data analytics. In: International Conference on Industrial Engineering and Operations Management, IEOM Society, pp. 923–934 (2020)
5. Zamora, P.M., Kwiatek, M., Bippus, V.N., Elejalde, E.C.: Increasing windows security by hardening PC configurations. In: EPJ Web of Conferences, vol. 214, p. 08019. EDP Sciences (2019)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Recent Trends and Opportunities in Domain Specific Operating Systems;2022 3rd International Conference for Emerging Technology (INCET);2022-05-27