Author:
Bilge Leyla,Dambra Savino
Publisher
Springer Berlin Heidelberg
Reference20 articles.
1. Bilge L, Han Y, Dell’Amico M (2017) Riskteller: predicting the risk of cyber incidents, pp 1299–1311
2. Bossler AM, Holt TJ (2009) On-line activities, guardianship, and malware infection: an examination of routine activities theory. Int J Cyber Criminol 3(1):400–420
3. Bozorgi M, Saul LK, Savage S, Voelker GM (2010) Beyond heuristics: learning to classify vulnerabilities and predict exploits, pp 105–114
4. Browne HK, Arbaugh WA, McHugh J, Fithen WL (2001) A trend analysis of exploitations, pp 214–229
5. Canali D, Bilge L, Balzarotti D (2014) On the effectiveness of risk prediction based on users browsing behavior, pp 171–182