Author:
Saeed Sabih,Black Paul,Pang Shaoning,Vamplew Peter
Reference57 articles.
1. World-wide web proxies;A Luotonen;Computer Networks and ISDN systems,1994
2. Beyond zero trust: Trust is a vulnerability;M Campbell;Computer,2020
3. Rsm analysis based cloud access security broker: a systematic literature review;S Ahmad;Cluster Computing,2022
4. Network firewalls;S M Bellovin;IEEE communications magazine,1994
5. Before we knew it: an empirical study of zero-day attacks in the real world;L Bilge;Proceedings of the 2012 ACM conference on Computer and communications security,2012