共 46 条
[1]
Data Anonymization Using Pseudonym System to Preserve Data Privacy
[J].
IEEE ACCESS,
2020, 8
:43256-43264
[2]
Al-Dhaqm A., 2023, Kids Cybersecurity Using Computational Intelligence Techniques, P81
[3]
Al-dhaqm A., 2012, INT J SCI ENG RES, V3
[4]
Al-dhaqm A., 2013, INT J SCI ENG RES, V4
[5]
Categorization and Organization of Database Forensic Investigation Processes
[J].
IEEE ACCESS,
2020, 8
:112846-112858
[6]
Al-Mugerrn R., 2023, INT C SMART COMP APP, P1, DOI [10.1109/ICSCA57840.2023.10087425, DOI 10.1109/ICSCA57840.2023.10087425]
[7]
Alghamdi AA, 2018, ENG TECHNOL APPL SCI, V8, P3598
[8]
Financial Fraud Detection Based on Machine Learning: A Systematic Literature Review
[J].
APPLIED SCIENCES-BASEL,
2022, 12 (19)
[9]
Extraction of Common Concepts for the Mobile Forensics Domain
[J].
RECENT TRENDS IN INFORMATION AND COMMUNICATION TECHNOLOGY,
2018, 5
:141-154