共 42 条
[1]
Ali A., 2022, 2022 International Conference on Business Analytics for Technology and Security (ICBATS), P1, DOI DOI 10.1109/ICBATS54253.2022.9759076
[3]
Alwashali AAMA, 2021, I C DEV ESYST ENG, P92, DOI [10.1109/DESE54285.2021.9719456, 10.1109/DeSE54285.2021.9719456]
[4]
August T., 2019, SSRN Electronic Journal, DOI DOI 10.2139/SSRN.3351416
[7]
Chaithanya B. N., 2022, Journal of Cyber Security and Mobility, V11, P621, DOI [10.13052/jcsm2245-1439.1146, DOI 10.13052/JCSM2245-1439.1146]
[8]
Chaithanya BN, 2022, Detecting ransomware attacks distribution through phishing URLs Using Machine Learning, DOI [10.1007/978-981-16-3728-5_61, DOI 10.1007/978-981-16-3728-5_61]
[10]
Dada Emmanuel Gbenga, 2021, Adv. Mach. Learn. Artif. Intell., V2, P11, DOI DOI 10.33140/AMLAI.02.01.03