Author:
Assaggaf Abdulrahman Mohammed Aqel,Al-Rimy Bander Ali,Ismail Noor Lees,Al-Nahari Abdulaziz
Publisher
Springer Nature Singapore
Reference21 articles.
1. Communications in Computer and Information Science;N Rastogi,2020
2. Noy, N.F., Mcguinness, D.L.: Ontology development 101: a guide to creating your first ontology (2001). www.unspsc.org
3. Olaimat, M.N., Maarof, M.A., Al-rimy, B.A.S.: Ransomware anti-analysis and evasion techniques: A survey and research directions. In: 2021 3rd International Cyber Resilience Conference (CRC), pp. 1–6. IEEE, January 2021
4. Mittal, S., Das, P.K., Mulwad, V., Joshi, A., Finin, T.: CyberTwitter: using Twitter to generate alerts for cybersecurity threats and vulnerabilities. In: Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2016, Nov. 2016, pp. 860–867 (2016). https://doi.org/10.1109/ASONAM.2016.7752338
5. Virmani, C., Pillai, A., Juneja, D.: Extracting information from social network using NLP (2017). http://www.ripublication.com
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献