1. ACM. 2022 . ACM Conference on Computer and Communications Security (CCS). http://www.sigsac.org/ccs.htmlLast accessed 23 Feb 2022. ACM. 2022. ACM Conference on Computer and Communications Security (CCS). http://www.sigsac.org/ccs.htmlLast accessed 23 Feb 2022.
2. Comparing Vulnerability Severity and Exploits Using Case-Control Studies
3. Risk Prioritization by Leveraging Latent Vulnerability Features in a Contested Environment
4. Omar Alrawi , Charles Lever , Kevin Valakuzhy , Kevin Snow , Fabian Monrose , Manos Antonakakis , 2021 . The Circle Of Life: A Large-Scale Study of the IoT Malware Lifecycle. In 30th USENIX Security Symposium (USENIX Security 21) . USENIX, Virtual Event, 3505–3522. Omar Alrawi, Charles Lever, Kevin Valakuzhy, Kevin Snow, Fabian Monrose, Manos Antonakakis, 2021. The Circle Of Life: A Large-Scale Study of the IoT Malware Lifecycle. In 30th USENIX Security Symposium (USENIX Security 21). USENIX, Virtual Event, 3505–3522.
5. Analyzing the Usefulness of the DARPA OpTC Dataset in Cyber Threat Detection Research