1. The work-averse cyberattacker model: theory and evidence from two million attack signatures;Allodi;Risk Anal.,2022
2. Before we knew it: an empirical study of zero-day attacks in the real world;Bilge,2012
3. An empirical study of ransomware attacks on organizations: an assessment of severity and salient factors affecting vulnerability;Connolly;J. Cybersecurity,2020
4. Enhancing honeypot deception capability through network service fingerprinting;Dahbul;J. Phys. Conf. Ser.,2017
5. Securi CAD by Foreseeti: a CAD tool for enterprise cyber security management;Ekstedt,2015