Author:
Munaiah Nuthan,Rahman Akond,Pelletier Justin,Williams Laurie,Meneely Andrew
Cited by
16 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Securing the Energy Industry with AI‐Powered Cybersecurity Solutions;The Power of Artificial Intelligence for the Next‐Generation Oil and Gas Industry;2023-12
2. Understanding Hackers’ Work: An Empirical Study of Offensive Security Practitioners;Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering;2023-11-30
3. A Quantitative Study on the Factors Influencing Implementation of Cybersecurity Laws and Regulations in Pakistan;Social Sciences;2023-11-10
4. Penetration testing of devices;2023 International Scientific Conference on Computer Science (COMSCI);2023-09-18
5. Cyber Threat Hunting to Detect Unknown Threats in the Enterprise Network;2023 IEEE International Conference on Cryptography, Informatics, and Cybersecurity (ICoCICs);2023-08-22