has been cited by the following article(s):
|
[1]
|
Securing the Mobile Frontier: A Review of Cyber Threats Associated with Smart Devices
International Journal of Advanced Research in Science, Communication and Technology,
2025
DOI:10.48175/IJARSCT-28455
|
|
|
|
|
[2]
|
PRACTICAL APPROACHES TO CYBER PROTECTION OF MOBILE DEVICES WITH THE HELP OF A SOLUTION ENDPOINT DETECTION AND RESPONSE
Cybersecurity: Education, Science, Technique,
2023
DOI:10.28925/2663-4023.2023.21.1731
|
|
|
|