Cited By
View all- Mahfouz A(2024)User Authentication in the IoT and IIoT EnvironmentSmart and Agile Cybersecurity for IoT and IIoT Environments10.4018/979-8-3693-3451-5.ch008(169-194)Online publication date: 30-Jun-2024
- Por LNg IChen YYang JKu C(2024)A Systematic Literature Review on the Security Attacks and Countermeasures Used in Graphical PasswordsIEEE Access10.1109/ACCESS.2024.337366212(53408-53423)Online publication date: 2024
- Farzand HAbraham MBrewster SKhamis MMarky K(2024)A Systematic Deconstruction of Human-Centric Privacy & Security Threats on Mobile PhonesInternational Journal of Human–Computer Interaction10.1080/10447318.2024.2361519(1-24)Online publication date: 12-Jun-2024
- Show More Cited By