Exploiting trust: Stealthy attacks through socioware and insider threats

Aditya K. Sood, Sherali Zeadally, Rohit Bansal

Research output: Contribution to journalArticlepeer-review

5 Scopus citations

Fingerprint

Dive into the research topics of 'Exploiting trust: Stealthy attacks through socioware and insider threats'. Together they form a unique fingerprint.

Computer Science