Author:
Preuveneers Davy,Joosen Wouter
Subject
Law,General Computer Science
Reference31 articles.
1. Space/time trade-offs in hash coding with allowable errors;Bloom;Commun. ACM,1970
2. Helping hands: measuring the impact of a large threat intelligence sharing community;Bouwman,2022
3. Towards privacy preserving threat intelligence;Dara;J. Inf. Secur. Appl.,2018