Personensuche
X
?
Water Resources Development and Management; Proceedings of the 2nd International Conference on Dam Safety Management and Engineering ,
2
A Short Review of Cybersecurity Issues and Efforts in the W..:
, In:
?
Data Science and Emerging Technologies; Lecture Notes on Data Engineering and Communications Technologies ,
3
Phishing Attack Types and Mitigation: A Survey:
, In:
?
Proceedings of the 5th International Conference on Signal Processing and Information Communications; Signals and Communication Technology ,
4
Detection and Prevention of ARP Cache Poisoning in Advanced..:
, In:
?
2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS) ,
6
Efficient Implementation of 2D Barcode Verification Algorit..:
, In:
?
2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS) ,
7
A Comparative Study of Data Anonymization Techniques:
, In:
?
Lecture Notes in Electrical Engineering; Proceedings of the 9th International Conference on Computational Science and Technology ,
10
Cyberbully Detection Survey: Malay-English Glossary of Cybe..:
, In:
?
Lecture Notes in Networks and Systems; Proceedings of the 2nd International Conference on Emerging Technologies and Intelligent Systems ,
11
Awareness of Phishing Attacks in the Public Sector: Review ..:
, In:
?
2023 IEEE 13th International Conference on System Engineering and Technology (ICSET) ,
12
A Proposed Multifactor Authentication Framework for SME in ..:
, In:
?
2022 IEEE International Conference on Computing (ICOCO) ,
14
A Review of Machine Learning Botnet Detection Techniques ba..:
, In:
?
2022 International Visualization, Informatics and Technology Conference (IVIT) ,
15