共 57 条
[1]
Abdullah A., 2019, 2019 2 INT C COMP, P1, DOI [10.1109/CAIS.2019.8769560, DOI 10.1109/cais.2019.8769560]
[2]
Abomhara M., 2015, Journal of Cyber Security and Mobility, V4, P65, DOI [DOI 10.13052/JCSM2245-1439.414, 10.13052/jcsm2245-1439.414]
[3]
Ahmed AW, 2017, INT J ADV COMPUT SC, V8, P489
[4]
Al Nafea Roaa, 2021, 2021 International Conference on Information Technology (ICIT), P779, DOI 10.1109/ICIT52682.2021.9491638
[5]
Alamer Maryam, 2021, 2021 International Conference on Information Technology (ICIT), P719, DOI 10.1109/ICIT52682.2021.9491123
[8]
Almaiah M.A., 2021, Artificial Intelligence and Blockchain for Future Cybersecurity Applications, P217
[10]
Almaiah MA, 2022, SENSORS-BASEL, V22, DOI 10.3390/s22041448