共 17 条
[2]
Babukarthik Raju Govindaraj, 2018, BIOSCI BIOTECH RES C
[3]
Cole E, 2013, ADVANCED PERSISTENT THREAT: UNDERSTANDING THE DANGER AND HOW TO PROTECT YOUR ORGANIZATION, P77, DOI 10.1016/B978-1-59-749949-1.00004-8
[4]
Dhote B.L, 2019, TRUST SECURITY SHARE, DOI [10.1007/978-981-13-2673.8_14, DOI 10.1007/978-981-13-2673.8_14]
[5]
Ingram J.B., 2017, TEMPORAL CYBER ATTAC, DOI [10.2172/1409921, DOI 10.2172/1409921]
[6]
Kim Y.S., 2014, Mobile, ubiquitous, and intelligent computing, P489
[7]
Lage O., 2020, Computer Security Threats, DOI [10.5772/intechopen.90061, DOI 10.5772/INTECHOPEN.90061]
[8]
Meghana A., 2019, INT J INNOVATIVE TEC, V8, P874
[9]
Prasad G.S., 2019, INT J INNOV TECHNOL, V8, P679
[10]
Prasanthi M. Sai, 2019, INT J INNOV TECHNOL, V8, P147