Author:
Rajendran Gowthamaraj,Ragul Nivash R S,Parthy Purushotham Parthiban,Balamurugan S
Cited by
27 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Securing the IoT: An In-Depth Analysis of Ubuntu Core Hardening Measures Using CIS LTS Guide;2024 4th Interdisciplinary Conference on Electrics and Computer (INTCEC);2024-06-11
2. A Novel Post Exploitation Framework for Red Team Operations - Buzzard;2024 International Conference on Intelligent Systems for Cybersecurity (ISCS);2024-05-03
3. Emerging Horizons;Advances in Computational Intelligence and Robotics;2024-04-01
4. Ensuring cybersecurity for industrial networks: A solution for ARP-based MITM attacks;Journal of Computer Security;2024-02-01
5. Zero Trust+: A Trusted-based Zero Trust architecture for IoT at Scale;2024 IEEE International Conference on Consumer Electronics (ICCE);2024-01-06