ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Cybersecurity, Computer Networks Phishing, Malware, Ransomware, and Social Engineering Anti-Piracy Reviews
2021 3rd International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)
◽
10.1109/hora52670.2021.9461272
◽
2021
◽
Author(s):
Mehmet Ozer Baseskioglu
◽
Abdulkadir Tepecik
Keyword(s):
Computer Networks
◽
Social Engineering
Download Full-text
Related Documents
Cited By
References
Computer Networks: A Proposal for Empowering Consulting Psychologists
PsycEXTRA Dataset
◽
10.1037/e530682012-006
◽
1990
◽
Author(s):
Mark Watt
Keyword(s):
Computer Networks
Download Full-text
To substantiate the principle of building local computer networks
Central Ukrainian Scientific Bulletin. Technical Sciences
◽
10.32515/2664-262x.2019.1(32).194-201
◽
2019
◽
pp. 194-201
Author(s):
Dmitro Trushakov
◽
◽
Taras Glushenko
◽
Nuzhny Vitaliy
◽
◽
...
Keyword(s):
Computer Networks
◽
Local Computer
Download Full-text
A Three-Cascade Method of Solving the Problem on Allocation for Optimizing the Performance of Computer Networks
Telecommunications and Radio Engineering
◽
10.1615/telecomradeng.v66.i3.20
◽
2007
◽
Vol 66
(3)
◽
pp. 201-207
Author(s):
D. I. Rodionov
◽
V. M. Dovgal
Keyword(s):
Computer Networks
◽
Cascade Method
Download Full-text
2017 South Eastern European Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM)
10.23919/seeda-cecnsm41099.2017
◽
2017
◽
Keyword(s):
Social Media
◽
Computer Networks
◽
Design Automation
◽
Eastern European
◽
Computer Engineering
◽
South Eastern
Download Full-text
Detection of Man-In-The-Middle Attack In Computer Networks
i-manager s Journal on Communication Engineering and Systems
◽
10.26634/jcs.2.1.2071
◽
2013
◽
Vol 2
(1)
◽
pp. 1-8
Author(s):
Salifu Abdul-Mumin
Keyword(s):
Computer Networks
◽
Man In The Middle
Download Full-text
Illegitimacy and Social Engineering
Journal of Comparative Family Studies
◽
10.3138/jcfs.4.2.269
◽
1973
◽
Vol 4
(2)
◽
pp. 269-275
Author(s):
Jan Gorecki
Keyword(s):
Social Engineering
Download Full-text
Computer Networks, the Internet and Next Generation Networks
10.3726/978-3-653-01750-2
◽
2012
◽
Author(s):
Thi-Thanh-Mai Hoang
Keyword(s):
Computer Networks
◽
Next Generation Networks
◽
The Internet
◽
Next Generation
Download Full-text
Regenerative Simulation Methods for Local Area Computer Networks.
10.21236/ada146197
◽
1984
◽
Author(s):
P. J. Haas
◽
G. S. Shedler
Keyword(s):
Computer Networks
◽
Local Area
◽
Simulation Methods
◽
Regenerative Simulation
Download Full-text
Transnational Social Engineering Project of Turkish Islamists
SSRN Electronic Journal
◽
10.2139/ssrn.3696182
◽
2019
◽
Author(s):
Ihsan Yilmaz
Keyword(s):
Social Engineering
◽
Engineering Project
Download Full-text
Systematic Review on Social Engineering: Hacking by Manipulating Humans
SSRN Electronic Journal
◽
10.2139/ssrn.3720955
◽
2020
◽
Author(s):
Chandra Sekhar Bhusal
Keyword(s):
Systematic Review
◽
Social Engineering
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close