has been cited by the following article(s):
[1]
|
Privacy Law Protection Based on the Information Security Assurance Algorithm
Computational Intelligence and Neuroscience,
2022
DOI:10.1155/2022/8006605
|
|
|
[2]
|
Defense-In-Depth Security Strategy in Log4j Vulnerability Analysis
2022 International Conference Advancement in Data Science, E-learning and Information Systems (ICADEIS),
2022
DOI:10.1109/ICADEIS56544.2022.10037384
|
|
|
[3]
|
Handbook of Multimedia Information Security: Techniques and Applications
2019
DOI:10.1007/978-3-030-15887-3_2
|
|
|