Cited By
View all- Shankar SGudadinni SMohta R(2024)A Comprehensive Study of Cyber Threats in the Banking IndustryStrengthening Industrial Cybersecurity to Protect Business Intelligence10.4018/979-8-3693-0839-4.ch011(244-269)Online publication date: 26-Apr-2024
- Nash AStudiawan HGrispos GChoo K(2024)Security Analysis of Google Authenticator, Microsoft Authenticator, and AuthyDigital Forensics and Cyber Crime10.1007/978-3-031-56583-0_13(197-206)Online publication date: 3-Apr-2024
- Teng YWang WShao JWan HHuang HLiu YLin J(2024)Curveball+: Exploring Curveball-Like Vulnerabilities of Implicit Certificate ValidationComputer Security – ESORICS 202310.1007/978-3-031-51476-0_11(212-234)Online publication date: 11-Jan-2024
- Show More Cited By




