Cited By
View all- Devrani RB S SKumar Bhagat A(2024)Assessing the Vulnerability of Information Security Models to Malware in Networked Applications2024 2nd International Conference on Artificial Intelligence and Machine Learning Applications Theme: Healthcare and Internet of Things (AIMLA)10.1109/AIMLA59606.2024.10531391(1-6)Online publication date: 15-Mar-2024
- Wijaya ASurjandy Sriwardiningsih E(2023)Examining the Influence of Knowledge, Social Influence, Trust and Behaviour Factors on Digital Advertisement Based on Information Security Model2023 International Conference on Information Management and Technology (ICIMTech)10.1109/ICIMTech59029.2023.10278012(585-590)Online publication date: 24-Aug-2023
- Okebule TAdeyemo OOlatunji KAwe A(2022)Review of Works Content Analyzer for Information Leakage Detection and Prevention in Android Smart DevicesABUAD International Journal of Natural and Applied Sciences10.53982/aijnas.2022.0201.02-j2:1(12-28)Online publication date: 30-Mar-2022
- Show More Cited By