Author:
Radivilova Tamara,Kirichenko Lyudmyla,Ageyev Dmytro,Tawalbeh Maxim,Bulakh Vitalii
Cited by
21 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Process Identity-Based Firewalling;Lecture Notes in Computer Science;2024
2. Exploring the Vulnerabilities and Countermeasures of SSL/TLS Protocols in Secure Data Transmission Over Computer Networks;2023 IEEE 12th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS);2023-09-07
3. YODA: Covert Communication Channel over Public DNS Resolvers;2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN);2023-06
4. Graph Neural Networks for Intrusion Detection: A Survey;IEEE Access;2023
5. Activity Detection from Encrypted Remote Desktop Protocol Traffic;Innovative Security Solutions for Information Technology and Communications;2023