Open Access
Issue
MATEC Web Conf.
Volume 392, 2024
International Conference on Multidisciplinary Research and Sustainable Development (ICMED 2024)
Article Number 01094
Number of page(s) 6
DOI https://doi.org/10.1051/matecconf/202439201094
Published online 18 March 2024
  1. Sheth, Mrs Ashwini, Sachin Bhosale, Farish Kurupkar, and Asst Prof. “Research paper on cybersecurity.” Contemporary research (2021): 2231-2137. [Google Scholar]
  2. Reddy, G. Nikhita, and G. J. Reddy. “A study of cyber security challenges and its emerging trends on latest technologies.” Arxiv.org preprint arXiv:1402.1842 (2014). [Google Scholar]
  3. Parikh, Tushar P., and Ashok R. Patel. “Cyber security: Study on attack, threat, vulnerability.” 2017 International Journal of Research in Modern Engineering and Emerging Technology (2017). [Google Scholar]
  4. Deplane, Antoine, Sheryl Hermoso, and Kristofer Anandita. “Cyber-attack detection thanks to machine learning algorithms.” Arxiv.org preprint arXiv:2001.06309 (2020). [Google Scholar]
  5. Rathee, Dhruv, and Suman Mann. “Detection of E-mail phishing attacks–using machine learning and deep learning.” International Journal of Computer Applications 183, no. 1 (2022) [CrossRef] [Google Scholar]
  6. Jain, Mohit, Aryan Sinha, Aman Agrawal, and Nimesh Yadav. “Cyber security: Current threats, challenges, and prevention methods.” In 2022 International Conference on Advances in Computing, Communication and Materials (ICACCM), pp. 1-9. IEEE, 2022. [Google Scholar]
  7. Sampath, P., Vijay Shukla, Santosh Kumar, Anita Gehlot, V. Samatha, and T. Sampath Kumar. “An Analysis of Cyber security Risks and Authentication Systems.” In 2023 10th International Conference on Computing for Sustainable Global Development (INDIACom), pp. 1330-1335. IEEE, 2023. [Google Scholar]
  8. Chivukula, Rohit, T. Jaya Lakshmi, Lohith Ranganadha Reddy Kandula, and Kalavathi Alla. “A study of cyber security issues and challenges.” In 2021 IEEE Bombay Section Signature Conference (IBSSC), pp. 1-5. IEEE, 2021. [Google Scholar]
  9. Tripathi, Surendra, K. K. Mishra, and Shailesh Tiwari. “Improving Applicability of DE Algorithm by Designing Multi-Operator Variant of DE.” Journal of Multiple-Valued Logic & Soft Computing 40 (2023). [Google Scholar]
  10. Tripathi, Surendra, K. K. Mishra, and Shailesh Tiwari. “Modified Differential Evolution Algorithm with Updated Mutation and Crossover Operator.” Journal of Multiple-Valued Logic & Soft Computing 38 (2022). [Google Scholar]
  11. Barraclough, Phoebe A., Gerhard Fehringer, and John Woodward. “Intelligent cyberphishing detection for online.” computers & security 104 (2021): 102123. [CrossRef] [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.