Cited By
View all- Barrett SSalontai ABardhan RDorai GAkbas EWoodell P(2025)Identifying and Analyzing Vault AppsAdvances in Digital Forensics XX10.1007/978-3-031-71025-4_4(63-78)Online publication date: 7-Jan-2025
- Gupta RSharma KGarg R(2024)Innovative Approach to Android Malware Detection: Prioritizing Critical Features Using Rough Set TheoryElectronics10.3390/electronics1303048213:3(482)Online publication date: 23-Jan-2024
- Sosnovyy VLashchevska N(2024)DETECTION OF MALICIOUS ACTIVITY USING A NEURAL NETWORK FOR CONTINUOUS OPERATIONCybersecurity: Education, Science, Technique10.28925/2663-4023.2024.23.2132243:23(213-224)Online publication date: 2024
- Show More Cited By