Skip to main content

Posts

Featured

References

  References Abri, F., Zheng, J., Namin, A. S., & Jones, K. S. (2022). Markov Decision Process for Modeling Social Engineering Attacks and Finding Optimal Attack Strategies.  IEEE Access, Access, IEEE ,  10 , 109949–109968. https://doi.org/10.1109/ACCESS.2022.3213711 Ponemon Institute (2019).  Ponemon Institute's 2019 Cost of a Data Breach Study: Global Overview. IBM . Available online at:  https://www.ibm.com/security/data-breach

Latest Posts

Why Do We Need Network Security?

Introduction

Network Security