Abstract: Nowadays, when computer technology plays an important role in our lives, attackers develop new techniques and tools that target these systems. Over time, there were hundreds of papers ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results