Cited By
View all- Mundt MBaier H(2023)Threat-Based Simulation of Data Exfiltration Toward Mitigating Multiple Ransomware ExtortionsDigital Threats: Research and Practice10.1145/35689934:4(1-23)Online publication date: 20-Oct-2023
- T. N. NPramod D(2023)Insider Intrusion Detection Techniques: A State-of-the-Art ReviewJournal of Computer Information Systems10.1080/08874417.2023.217533764:1(106-123)Online publication date: 14-Feb-2023
- Shishodia BNene M(2022)Data Leakage Prevention System for Internal Security2022 International Conference on Futuristic Technologies (INCOFT)10.1109/INCOFT55651.2022.10094509(1-6)Online publication date: 25-Nov-2022
- Show More Cited By