Cited By
View all- Almubairik NAlam Khan F(2025)Systematic Literature Review on Wearable Digital Forensics: Acquisition Methods, Analysis Techniques, Tools, and Future DirectionsIEEE Internet of Things Journal10.1109/JIOT.2024.348502712:2(1320-1342)Online publication date: 15-Jan-2025
- Hai Goh CPing Teoh A(2021)Determining Bring Your Own Device (Byod) Security Policy Compliance Among Malaysian Teleworkers: Perceived Cybersecurity Governance as Moderator2021 IEEE 5th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)10.1109/ICITISEE53823.2021.9655895(305-310)Online publication date: 24-Nov-2021
- Meidan YSachidananda VPeng HSagron RElovici YShabtai A(2020)A novel approach for detecting vulnerable IoT devices connected behind a home NATComputers & Security10.1016/j.cose.2020.10196897(101968)Online publication date: Oct-2020
- Show More Cited By