1. The heavy tails of vulnerability exploitation;L Allodi;Proceedings of the 2015 Engineering Secure Software and Systems Conference (ESSoS'15),2015
2. Then and now: On the maturity of the cybercrime markets the lesson that black-hat marketeers learned;L Allodi;IEEE Transactions on Emerging Topics in Computing,2015
3. Malwarelab: Experimentation with cybercrime attack tools;L Allodi;Proceedings of the 2013 6th Workshop on Cybersecurity Security and Test,2013
4. Comparing vulnerability severity and exploits using case-control studies;L Allodi;ACM Transaction on Information and System Security (TISSEC),2014
5. Information security economics -and beyond;R Anderson;Proceedings of the 9th International Conference on Deontic Logic in Computer Science, DEON '08,2008