Cited By
View all- Chitare NCoventry LNicholson J(2025)Exploring transparent communication for organisational cyber-resilience to sophisticated phishing attacksInformation & Computer Security10.1108/ICS-01-2025-0024Online publication date: 25-Sep-2025
- Prabhaker NBopche GGupta DArock M(2025)Generation of Honeytokens for Relational Database Using Conditional Tabular Generative Adversarial Network (CTGAN)Hybrid Intelligent Systems10.1007/978-3-031-78928-1_13(119-129)Online publication date: 15-Jul-2025
- Rabzelj MSedlar U(2025)Beyond the Leak: Analyzing the Real-World Exploitation of Stolen Credentials Using HoneypotsSensors10.3390/s2512367625:12(3676)Online publication date: 12-Jun-2025
- Show More Cited By


