Cited By
View all- Williams LKhan HBurnap P(2025)The Evolution of Digital Security by Design Using Temporal Network AnalysisInformatics10.3390/informatics1201000812:1(8)Online publication date: 17-Jan-2025
- Wang YGuo CYan JZhang ZCheng Y(2025)Unmasking hidden threats: Enhanced detection of embedded malicious domains in pirate streaming videosComputers and Electrical Engineering10.1016/j.compeleceng.2025.110087123(110087)Online publication date: Apr-2025
- Zhu J(2024)Optimization of network security protection posture based on data clusteringApplied Mathematics and Nonlinear Sciences10.2478/amns-2024-03449:1Online publication date: 26-Feb-2024
- Show More Cited By