103
Views
6
CrossRef citations to date
0
Altmetric
Articles

Review of cyber security threats and proposed trustworthy memory acquisition mechanism

&

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (5)

Amogh Pete, Himanshu Gupta, Shubham Varshney, Pushpendra Kumar Chandra & Satish Kumar Negi. (2022) A novel approach for verifying selective user identity attributes online using open banking APIs. Journal of Information and Optimization Sciences 43:5, pages 941-948.
Read now
Pushkar Kishore, Gayatri Nayak & Swadhin Kumar Barisal. (2022) Applying unsupervised system-call based software security techniques for anomaly detection. Journal of Information and Optimization Sciences 43:5, pages 915-922.
Read now
Rutuja R. Patil, Gagandeep Kaur, Himank Jain, Ayush Tiwari, Soham Joshi, Keshav Rao & Amit Sharma. (2022) Machine learning approach for phishing website detection : A literature survey. Journal of Discrete Mathematical Sciences and Cryptography 25:3, pages 817-827.
Read now
Suruchi Gera & Adwitiya Sinha. (2021) A machine learning-based malicious bot detection framework for trend-centric twitter stream. Journal of Discrete Mathematical Sciences and Cryptography 24:5, pages 1337-1348.
Read now
Swati Maurya & Anurag Jain. (2020) Deep learning to combat phishing. Journal of Statistics and Management Systems 23:6, pages 945-957.
Read now

Articles from other publishers (1)

Prem Mahendra Kothari & Ratan Singh Gaharwar. 2022. Using Computational Intelligence for the Dark Web and Illicit Behavior Detection. Using Computational Intelligence for the Dark Web and Illicit Behavior Detection 20 32 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.