Publisher
Springer Nature Singapore
Reference22 articles.
1. Lecture Notes in Computer Science;A Simmonds,2004
2. Stallings, W., Brown, L.: Computer Security Principles and Practice. Second penyunt (2012)
3. Von Solms, R., Van Niekerk, J.: From information security to cyber security. Comput. Secur. 38, 97–102 (2013)
4. Boyd, B.L.: Cyber warfare: armageddon in a teacup? Army Command and General Staff College, Fort Leavenworth, KS (2009)
5. Toutsop, O., Harvey, P., Kornegay, K.: Monitoring and detection time optimization of man in the middle attacks using machine learning. In: 2020 IEEE Applied Imagery Pattern Recognition Workshop (AIPR). IEEE (2020)