Author:
Onyema E. M.,Dinar A. E.,Ghouali S.,Merabet B.,Merzougui R.,Feham M.
Publisher
Springer Nature Singapore
Reference32 articles.
1. Hallman R, Bryan J, Palavicini G, Divita J, Romero-Mariona J (2017) IoDDoS—the internet of distributed denial of sevice attacks—a case study of the mirai malware and IoT-based botnets. In: Proceedings of the 2nd international conference on Internet of Things, Big Data and Security (IoTBDS 2017), Porto, Portugal, 24–26 April 2017, pp 47–58
2. https://www.zdnet.com/article/the-hacking-strategies-that-will-dominate-in-2019/
3. https://www2.deloitte.com/global/en/pages/risk/cyber-strategic-risk/articles/Telecommunications.html
4. Schneider B (2000) Attack trees: modeling security threats. Dr. Dobb’s J 1:5
5. Ethical Hacking. Tutorials point Simply Easy Learning, pp 86. https://www.tutorialspoint.com/ethical_hacking/index.htm
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献