You are on page 1of 1

REFERENCE

[1] Wojciech Mazurczyk, Luca Caviglione, Cyber Reconnaissance Techniques, Communications of


the ACM March 2021.
[2] Shanto Roy, NaziaSharmin, Jamie C. Acosta, Christopher Kiekintveld, Aron Laszka, Survey and
Taxonomy of Adversarial Reconnaissance Technique, May 2021.
[3] Danda B. Rawat, Journal on Cyber security and Privacy, Journal of Cyber security and Privacy: A
New Open Access Journal, 2021.
[4] Abdulkadir Bilen and Ahmet BedriAzur, Cyber-attack method and perpetrator prediction using
machine learning algorithms, s. PeerJComput 2021.
[5] Ahmad Mtair AL Hawamleh, Alorfi AlmuhannadSulaiman M, Jassim Ahmad Al-Gasawneh,
Ghada Al-Rawashdeh, Cyber Security and Ethical Hacking: The Importance of Protecting User
Data Solid State Technology, 2020
[6] Rohit Kalakuntla, AnveshBabuVanamala, Ranjith Reddy Kolipyaka, Cyber Security, 2019,
HOLISTICA ,2019.
[7] Idimadakala Nagaraju , Ethics in Ethical Hacking , International Journal of Scientific &
Engineering Research, 2018.
[8] Saloni Khurana, A Review Paper on Cyber Security International Journal of Engineering Research
& Technology (IJERT) ISSN: 2278-0181 Published by, www.ijert.org, Conference Proceedings,
2017.
[9] Pavan Kumar, K. Pranathi, A Survey on Ethical Hacking, Approaches, Attacks, Procedure
Reliability in case of Cyber Crime. JAC: A Journal of Composition Theory,2017.
[10] Brijesh Kumar Pandey, Alok Singh and Lovely lakhmaniBalani, ETHICAL HACKING (Tools,
Techniques and Approaches, Conference Paper • January 2017(CAIM-International Conference on
Advancement in IT and Management At: Thakur Institute of Management Studies Career
Development and Research Thakur Village Kandivali East Mumbai),2017
[11] Victor-Valeriu Patriciu and Adrian Constantin Furtuna, Guide for Designing Cyber Security
Exercises recent advances in e-activities, information security and privacy ,2016
[12] https://owasp.org/www-project-top-ten/: Vulnerabilities in web applicationsWorkshops,
certification and training on cyber security.

You might also like