Alharbi, Nouf Fahad; Hewahi, Nabil
(2021-07-27)
Network intrusion activities started since the network topologies become available for public, the target devices were computers, servers, switches, routers and so on, but with the fever of smartphones spreading among the ...