Author:
Kavya Rani S R,Soundarya B C,Gururaj H L,Janhavi V
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Disjointed Cyber Warfare: Internal Conflicts among Russian Intelligence Agencies;Applied Cybersecurity & Internet Governance;2024-09-06
2. Cyber-Attack Analysis Using Vulnerability Assessment and Penetration Testing;Lecture Notes in Networks and Systems;2024
3. Advanced Exploration of Machine Learning in Cybersecurity: A Comprehensive Analysis;2023 3rd International Conference on Mobile Networks and Wireless Communications (ICMNWC);2023-12-04
4. Machine Learning (ML) Methods to Identify Data Breaches;Methods, Implementation, and Application of Cyber Security Intelligence and Analytics;2022-06-17
5. Analysis of Cyber Security Attacks using Kali Linux;2022 IEEE International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE);2022-04-23