• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4635977)   Today's Articles (631)   Subscriber (50066)
For: Astakhova LV, Medvedev IA. An Information Tool for Increasing the Resistance of Employees of an Organization to Social Engineering Attacks. Sci Tech Inf Proc 2021. [DOI: 10.3103/s0147688221010020] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
Number Cited by Other Article(s)
1
Li Y, Zhao L. Collaborating with Bounty Hunters: How to Encourage White Hat Hackers’ Participation in Vulnerability Crowdsourcing Programs through Formal and Relational Governance. INFORMATION & MANAGEMENT 2022. [DOI: 10.1016/j.im.2022.103648] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/05/2022]
2
A Taxonomy for Threat Actors’ Delivery Techniques. APPLIED SCIENCES-BASEL 2022. [DOI: 10.3390/app12083929] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/31/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA