Author:
Cole Rhiannon,Latif Shadman,Chowdhury Md Minhaz
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Uncover Security Weakness Before the Attacker Through Penetration Testing;2022 IEEE International Conference on Electro Information Technology (eIT);2022-05-19
2. Exploit Security Vulnerabilities by Penetration Testing;2022 IEEE International Conference on Electro Information Technology (eIT);2022-05-19
3. IoT Security for Smart Home: Issues and Solutions;2022 IEEE International Conference on Electro Information Technology (eIT);2022-05-19
4. Card Skimming: A Cybercrime by Hackers;2022 IEEE International Conference on Electro Information Technology (eIT);2022-05-19