Author:
Sadeghian Amirmohammad,Zamani Mazdak,Manaf Azizah Abd.
Cited by
20 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. What We Know About HTTP/3 and Its Implementation: A Literature Review;2024 IEEE 3rd International Conference on Computing and Machine Intelligence (ICMI);2024-04-13
2. Overview of SQL Injection Attack Detection Techniques;Proceedings of the 2023 International Conference on Communication Network and Machine Learning;2023-10-27
3. Service Classification of Network Traffic in 5G Core Networks using Machine Learning;2023 IEEE International Conference on Edge Computing and Communications (EDGE);2023-07
4. Automation of Quantifying Security Risk Level on Injection Attacks Based on Common Vulnerability Scoring System Metric;Pertanika Journal of Science and Technology;2023-03-31
5. Improving Network, Data and Application Security for SMEs;Proceedings of the 17th International Conference on Availability, Reliability and Security;2022-08-23