Author:
Lau F.,Rubin S.H.,Smith M.H.,Trajkovic L.
Cited by
131 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Exploring the Current Landscape of Cyberterrorism: Insights, Strategies, and the Impact of COVID-19;Advanced Sciences and Technologies for Security Applications;2024
2. The Closed Resolver Project: Measuring the Deployment of Inbound Source Address Validation;IEEE/ACM Transactions on Networking;2023-12
3. Enhancing blockchain security through natural language processing and real-time monitoring;International Journal of Parallel, Emergent and Distributed Systems;2023-11-06
4. Proven Transaction Flow Control for zk-Rollups;2023 5th Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS);2023-10-11
5. Machine Learning Techniques for Detecting DDOS Attacks;2023 3rd International Conference on Emerging Smart Technologies and Applications (eSmarTA);2023-10-10