Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Software
Reference56 articles.
1. The cost of malicious cyber activity to the U.S. economy;CEA,2018
2. 2017 cybercrime report;Ventures,2017
3. Cost of Cyber Crime Study. Insights of the security investments that make a difference;Accenture,2017
4. Liao X, Yuan K, Wang X, Li Z, Xing L, Beyah. R. Acing the IOC Game: Toward automatic discovery and analysis of open-source cyber threat intelligence. In: ACM SIGSAC conference on computer and communications security; 2016. p. 755–66.
5. Sabottke C, Suciu O, Dumitras T. Vulnerability disclosure in the age of social media: exploiting twitter for predicting real-world exploits. In: 24th USENIX security symposium; 2015. p. 1041–56.
Cited by
22 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献