共 69 条
[1]
Achieving Consistency of Software Updates against Strong Attackers
[J].
THIRD CENTRAL EUROPEAN CYBERSECURITY CONFERENCE (CECC 2019),
2019,
[2]
Abeywardana KY, 2016, PROCEEDINGS OF THE 2016 SAI COMPUTING CONFERENCE (SAI), P1054, DOI 10.1109/SAI.2016.7556108
[3]
Abramov MV, 2016, PROCEEDINGS OF THE XIX IEEE INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND MEASUREMENTS (SCM 2016), P58, DOI 10.1109/SCM.2016.7519682
[5]
Albladi S, 2016, 2016 IEEE INTERNATIONAL CONFERENCE ON CYBERCRIME AND COMPUTER FORENSIC (ICCCF)
[6]
Aldawood H., 2020, International Journal of Computer Applications, V177, P1, DOI DOI 10.5120/IJCA2020919744
[7]
An Academic Review of Current Industrial and Commercial Cyber Security Social Engineering Solutions
[J].
PROCEEDINGS OF 2019 THE 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY (ICCSP 2019) WITH WORKSHOP 2019 THE 4TH INTERNATIONAL CONFERENCE ON MULTIMEDIA AND IMAGE PROCESSING (ICMIP 2019),
2019,
:110-115
[9]
Measuring Source Credibility of Social Engineering Attackers on Facebook
[J].
PROCEEDINGS OF THE 49TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS 2016),
2016,
:3686-3695
[10]
ALRUBAIAN M, 2015, P 2 WORLD S WEB APPL, P1