Cited By
View all- Das SKim DAbbott JCamp LFarzan RLópez CCardoso Llach DQuercia DMustafa MNiu SWong-Villacrés M(2024)User-Centered Phishing Detection through Personalized Edge ComputingCompanion Publication of the 2024 Conference on Computer-Supported Cooperative Work and Social Computing10.1145/3678884.3681864(283-287)Online publication date: 11-Nov-2024
- Hu YTian GJiang ALiu SWei JWang JTan S(2022)A Practical Heartbeat-based Defense Scheme Against Cloning Attacks in PoA BlockchainComputer Standards & Interfaces10.1016/j.csi.2022.10365683:COnline publication date: 19-Sep-2022
- Sinha PRai ABhushan B(2019)Information Security threats and attacks with conceivable counteraction2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT)10.1109/ICICICT46008.2019.8993384(1208-1213)Online publication date: Jul-2019
- Show More Cited By