Author:
Tang Zhe,Yan Tao,Yang Jiawen,Guo Zixin
Reference12 articles.
1. Penetration Testing: Wireless Network Attacks Method on Kali Linux OS
2. Analysis of Password Protected Documents Using Statistical Approaches on High Performance Computing[C];Singh,2022
3. Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security: A Survey of Social Engineering Attacks and Steps for Mitigation of These Attacks[M];Yathiraju;Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security. IGI global,2022
4. Combining behavioral biometrics and session context analytics to enhance risk-based static authentication in web applications