1. Affinito, A., Botta, A., Garofalo, M., Ventre, G., 2018. Detecting port and net scan using apache spark. CoRR abs/1806.11047.
2. Agrawal, A., Fu, W., Menzies, T., 2016. What is wrong with topic modeling? (and how to fix it using search-based se). CoRR abs/1608.08176
3. On the collaborative practices of cyber threat intelligence analysts to develop and utilize tacit threat and defence knowledge;Ahrend,2016
4. Finding cryptocurrency attack indicators using temporal logic and darkweb data;Almukaynizi,2018
5. S$A: a shared cache attack that works across cores and defies VM sandboxing - and its application to AES;Apecechea,2015