Author:
Alauthman Mohammad,Almomani Ammar,Alweshah Mohammed,Omoush Waleed,Alieyan Kamal
Reference1 articles.
1. IID. (2011). eCrime Trends Report First Quarter, 2011, Report 2011.
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Artificial Intelligence Applications in Cybersecurity;Handbook of Research on AI Methods and Applications in Computer Engineering;2023-01-30
2. The Prediction of Attacks and Challenges in Cyber Security Using Machine Learning Techniques;Proceedings of the 2nd International Conference on Cognitive and Intelligent Computing;2023
3. Intrusion Detection System Based on Machine Learning Techniques: A Survey;2022 2nd International Conference on Advances in Engineering Science and Technology (AEST);2022-10-24
4. A Review on Machine Learning Strategies for Real-World Engineering Applications;Mobile Information Systems;2022-08-28
5. An overview of machine learning algorithms for detecting phishing attacks on electronic messaging services;2022 45th Jubilee International Convention on Information, Communication and Electronic Technology (MIPRO);2022-05-23