Author:
Kumar Barnala Kiran,Raj Neha,Dhivvya JP,Muralidharan Dhivya
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Comprehensive C2 Analysis and Anomaly Detection in HTTP Traffic: A MongoDB-Based Approach;2024 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI);2024-05-09
2. Cryptographically Secured Data Transmission Over a Network with NetCAT;2024 International Conference on Electronics, Computing, Communication and Control Technology (ICECCC);2024-05-02
3. Fortifying Information Security: Security Implications of Microservice and Monolithic Architectures;2023 16th International Conference on Security of Information and Networks (SIN);2023-11-20
4. Network System Healthcheck;2023 21st International Conference on Emerging eLearning Technologies and Applications (ICETA);2023-10-26
5. A Systematic Literature Review on Penetration Testing in Networks: Future Research Directions;Applied Sciences;2023-06-09