共 78 条
[1]
Abaimov S., Understanding and classifying permanent denial-of-service attacks, Journal of Cybersecurity and Privacy, 4, 2, pp. 324-339, (2024)
[2]
Ablon L., Bogart A., Zero days, thousands of nights: The life and times of zero-day vulnerabilities and their exploits, (2017)
[3]
Abu-Salih B., Al-Tawil M., Khoury A., Al-Qudah D. A., Abu Zaid I., Alabdale M., Azar D., MAD-Onto: An ontology design for mobile app development, Frontiers in Artificial Intelligence, 8, (2025)
[4]
Ahmad R., Alsmadi I., Alhamdani W., Tawalbeh L., Zero-day attack detection: A systematic literature review, Artificial Intelligence Review, 56, 10, pp. 10733-10811, (2023)
[5]
Ahmadi S., Systematic literature review on cloud computing security: Threats and mitigation strategies, Journal of Information Security, 15, 2, pp. 148-167, (2024)
[6]
Alqahtani S., Eghan E. E., Rilling J., Tracing known security vulnerabilities in software repositories: A semantic web enabled modeling approach, Science of Computer Programming, 121, pp. 153-175, (2016)
[7]
Aslan O., Aktug S. S., Ozkan-Okay M., Yilmaz A. A., Akin E., A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions, Electronics (Basel), 12, 6, (2023)
[8]
Atlam H. F., Alassafi O. M., Alenezi A., Walters R. J., Wills G. B., XACML for building access control policies in internet of things, Proceedings of the 3rd International Conference on Internet of Things, Big Data and Security, 1, pp. 253-260, (2018)
[9]
Azeezat A. A., Adebukola S. O., Adebayo A., Olushola O. B., A conceptual hybrid model of deep convolutional neural network (DCNN) and long short-term memory (LSTM) for masquerade attack detection, Information and communication technology and applications. ICTA 2020. Communications in Computer and Information Science, 1350, (2021)
[10]
Basit A., Zafar M., Liu X., Javed R. A., Jalil Z., Kifayat K., A comprehensive survey of AI-enabled phishing attacks detection techniques, (2021)