1. Nikolaos Alexopoulos , Manuel Brack , Jan Philipp Wagner , Tim Grube, and Max Mühlhäuser. 2022 . How Long Do Vulnerabilities Live in the Code? A Large-Scale Empirical Measurement Study on FOSS Vulnerability Lifetimes. en. In 359--376. isbn: 978-1-939133-31-1. https://www.usenix.org/conference/u senixsecurity22/presentation/alexopoulos. Nikolaos Alexopoulos, Manuel Brack, Jan Philipp Wagner, Tim Grube, and Max Mühlhäuser. 2022. How Long Do Vulnerabilities Live in the Code? A Large-Scale Empirical Measurement Study on FOSS Vulnerability Lifetimes. en. In 359--376. isbn: 978-1-939133-31-1. https://www.usenix.org/conference/u senixsecurity22/presentation/alexopoulos.
2. Manos Antonakakis et al. 2017. Understanding the mirai botnet. In 26th USENIX security symposium (USENIX Security 17) 1093--1110. Manos Antonakakis et al. 2017. Understanding the mirai botnet. In 26th USENIX security symposium (USENIX Security 17) 1093--1110.
3. Windows of vulnerability: a case study analysis
4. 2022. Atlassian Confluence Vulnerability CVE-2022-26134 Abused For Cryptocurrency Mining , Other Malware. en-US. (Sept. 2022 ). https://www.trendmic ro.com/en_us/research/22/i/atlassian-confluence-vulnerability-cve-2022-26 134-abused-for-cryptocurrency-mining-other-malware.html. 2022. Atlassian Confluence Vulnerability CVE-2022-26134 Abused For Cryptocurrency Mining, Other Malware. en-US. (Sept. 2022). https://www.trendmic ro.com/en_us/research/22/i/atlassian-confluence-vulnerability-cve-2022-26 134-abused-for-cryptocurrency-mining-other-malware.html.
5. Before we knew it