Login / Signup

Analysis of the attack vectors used by threat actors during the pandemic.

Vitalii SusukailoIvan OpirskyySviatoslav Vasylyshyn
Published in: CSIT (2) (2020)
Keyphrases
  • social networks
  • statistical analysis
  • database
  • case study
  • image analysis
  • databases
  • image processing
  • video sequences
  • countermeasures