238
Views
20
CrossRef citations to date
0
Altmetric
Articles

Towards a taxonomy of cyber threats against target applications

, &

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (1)

Gayatri Sakya & Vidushi Sharma. (2019) Performance evaluation of ADMC-MAC mission critical protocol for wireless sensor networks. Journal of Discrete Mathematical Sciences and Cryptography 22:8, pages 1407-1422.
Read now

Articles from other publishers (19)

Vineeta Singh & Vandana Dixit Kaushik. 2023. Exploring Cyber Criminals and Data Privacy Measures. Exploring Cyber Criminals and Data Privacy Measures 40 64 .
Keith S. Jones, Natalie R. Lodinger, Benjamin P. Widlus, Akbar Siami Namin, Emily Maw & Miriam Armstrong. (2022) Grouping and Determining Perceived Severity of Cyber-Attack Consequences: Gaining Information Needed to Sonify Cyber-Attacks. Journal on Multimodal User Interfaces 16:4, pages 399-412.
Crossref
Monica Malik, Khushi Gandhi & Bhawna Narwal. (2022) AMAKA. International Journal of Information Security and Privacy 16:1, pages 1-31.
Crossref
Mohamed Abdel-Basset, Nour Moustafa, Hossam Hawash & Weiping DingMohamed Abdel-Basset, Nour Moustafa, Hossam Hawash & Weiping Ding. 2022. Deep Learning Techniques for IoT Security and Privacy. Deep Learning Techniques for IoT Security and Privacy 113 130 .
Darshini P, Mohana Kumar S, CG Raghavendra, Krishna Prasad SJ, Kavitha H & Divakara SS. (2021) Cyber Security Threats Detection Analysis and Remediation. Cyber Security Threats Detection Analysis and Remediation.
Bhawna Narwal & Amar Kumar Mohapatra. (2021) SAMAKA: Secure and Anonymous Mutual Authentication and Key Agreement Scheme for Wireless Body Area Networks. Arabian Journal for Science and Engineering 46:9, pages 9197-9219.
Crossref
Upasna Singh & Bhawna Narwal. 2021. Progress in Advanced Computing and Intelligent Engineering. Progress in Advanced Computing and Intelligent Engineering 295 305 .
Monica Malik & Bhawna Narwal. 2021. Next Generation Information Processing System. Next Generation Information Processing System 82 90 .
Nishtha Mehndiratta. (2020) A Yoking-Proof and PUF-based Mutual Authentication Scheme for Cloud-aided Wearable Devices. A Yoking-Proof and PUF-based Mutual Authentication Scheme for Cloud-aided Wearable Devices.
Mrinal Kaushik, Monica Malik & Bhawna Narwal. (2020) Developing Malware and Analyzing it Afore & After Steganography with OSINTs. Developing Malware and Analyzing it Afore & After Steganography with OSINTs.
Bhawna Narwal, Arushi Ojha, Nimisha Goel & Sudipti Dhawan. (2020) A Yoking-Proof Based Remote Authentication Scheme for Cloud-Aided Wearable Devices (YPACW). A Yoking-Proof Based Remote Authentication Scheme for Cloud-Aided Wearable Devices (YPACW).
. 2020. Cybersecurity in Humanities and Social Sciences. Cybersecurity in Humanities and Social Sciences 25 66 .
Bhawna Narwal & Amar Kumar Mohapatra. (2020) A Survey on Security and Authentication in Wireless Body Area Networks. Journal of Systems Architecture, pages 101883.
Crossref
Bhawna Narwal & Amar Kumar Mohapatra. (2020) SEEMAKA: Secured Energy-Efficient Mutual Authentication and Key Agreement Scheme for Wireless Body Area Networks. Wireless Personal Communications 113:4, pages 1985-2008.
Crossref
Justinas Rastenis, Simona Ramanauskaitė, Justinas Janulevičius, Antanas Čenys, Asta Slotkienė & Kęstutis Pakrijauskas. (2020) E-mail-Based Phishing Attack Taxonomy. Applied Sciences 10:7, pages 2363.
Crossref
Kamran Shaukat, Suhuai Luo, Vijay Varadharajan, Ibrahim A. Hameed & Min Xu. (2020) A Survey on Machine Learning Techniques for Cyber Security in the Last Decade. IEEE Access 8, pages 222310-222354.
Crossref
Sudipti Dhawan, Shubhra Shah & Bhawna Narwal. 2020. Data Science and Analytics. Data Science and Analytics 14 25 .
Bhawna Narwal. (2019) Security Analysis and Verification of Authenticated Mobile Payment Protocols. Security Analysis and Verification of Authenticated Mobile Payment Protocols.
Bhushan Manjre & Krishan Goyal. (2022) Essential Components of Software Framework for Mobile Forensic Tool to Extract and Decode the Mobile Artifacts. SSRN Electronic Journal.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.