Author:
Barik Kousik,Das Saptarshi,Konar Karabi,Chakrabarti Banik Bipasha,Banerjee Archita
Reference25 articles.
1. Security practitioners in context: their activities and interactions with other stakeholders within organizations;Werlinger;Int. J. Hum. - Comput. Stud.,2009
2. Human, organizational, and technological factors of IT security;Hawkey,2008
3. A cognitive walkthrough of autopsy forensic browser;Furnell;Inf. Manage. Comput. Secur.,2009
4. A scalable architecture for network traffic forensics;Letavay;Rev. Roum. Sci. Techn.– Électrotechn. et Energ. Vol.,2019
5. Network vulnerability analysis on brain signal/image databases using Nmap and Wireshark tools;Bagyalakshmi;IEEE Access,2018
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献