Author:
Dabbagh Mehiar,Ghandour Ali J.,Fawaz Kassem,Hajj Wassim El,Hajj Hazem
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Modeling Intruder Reconnaissance Behavior through State Diagrams to Support Defensive Deception;Journal of Cybersecurity and Privacy;2023-06-14
2. Slow Port Scanning Attack Detection Algorithm Based on Dynamic Time Window Mechanism;Communications in Computer and Information Science;2023
3. Network tool for hybrid analysis with External and Internal Scanning for Vulnerability Assessment of Network Nodes;2022 25th International Symposium on Wireless Personal Multimedia Communications (WPMC);2022-10-30
4. Cyber-physical Risk Security Framework Development in Digital Supply Chains;2021 62nd International Scientific Conference on Information Technology and Management Science of Riga Technical University (ITMS);2021-10-14
5. Slow Scan Attack Detection Based on Communication Behavior;2020 the 10th International Conference on Communication and Network Security;2020-11-27