共 34 条
[2]
Ahmed N, 2017, IEEE REG 10 HUMANIT, P788, DOI 10.1109/R10-HTC.2017.8289074
[3]
Alarifi A., 2012, 2012 International Conference on Communications and Information Technology (ICCIT), P6, DOI 10.1109/ICCITechnol.2012.6285845
[4]
Albaroodi H. A., 2019, INT C ADV CYB SEC, P305
[5]
Web Users' Knowledge and Their Behavior towards Security Threats and Vulnerabilities
[J].
2015 4TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES (ACSAT),
2015,
:256-260
[6]
Alotaibi F, 2016, INT CONF INTERNET, P154, DOI 10.1109/ICITST.2016.7856687
[7]
AlSagri Hatoon S., 2015, 2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA). Proceedings, P1, DOI 10.1109/CyberSA.2015.7166111
[8]
Alzahrani A., 2016, International Journal of Computer Science Issues, V13, P129, DOI DOI 10.20943/01201606.129135
[10]
Authentication of Smartphone Users Using Behavioral Biometrics
[J].
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS,
2016, 18 (03)
:1998-2026