Author:
Jabar Thulfiqar,Singh Manmeet Mahinderjit,Al-Kadhimi Amjed Ahmed
Reference32 articles.
1. Zulkefli Z, Mahinderjit Singh M (2020) Sentient-based access control model: a mitigation technique for advanced persistent threats in smartphones. J Inf Sec Appl 51. https://doi.org/10.1016/j.jisa.2019.102431
2. XLoader Disguises as Android Apps, Has FakeSpy Links, https://www.trendmicro.com/en_us/research/19/d/new-version-of-xloader-that-disguises-as-android-apps-and-an-ios-profile-holds-new-links-to-fakespy.html. Accessed on 29 Apr 2021
3. Tatam M, Shanmugam B, Azam S, Kannoorpatti K (2021) A review of threat modelling approaches for APT-style attacks
4. Alfred R, Lim Y, Asri A, Ibrahim A, Anthony P (2018) Lect Notes Electric Eng 481
5. Al-Shaer R, Spring JM, Christou E (2020) Learning the associations of MITRE ATT&CK adversarial techniques
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献