1. 2017. (2017). https://www2.fireeye.com/rs/848-DID-242/images/APT28-Center-of-Storm-2017.pdf
2. Luca Allodi. 2017. Economic factors of vulnerability trade and exploitation. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, 1483--1499.
3. Luca Allodi and Sandro Etalle. 2017. Towards realistic threat modeling: attack commodification, irrelevant vulnerabilities, and unrealistic assumptions. In Proceedings of the 2017 Workshop on Automated Decision Making for Active Cyber Defense. ACM, 23--26.
4. Luca Allodi and Fabio Massacci. 2014. Comparing vulnerability severity and exploits using case-control studies.ACM Transactions on Information and System Security (TISSEC)17, 1 (2014), 1.
5. Luca Allodi, Fabio Massacci, and Julian M Williams. 2017. The work-averse cyber attacker model: Theory and evidence from two million attack signatures. Available at SSRN 2862299(2017).