1. Comparing Vulnerability Severity and Exploits Using Case-Control Studies
2. F. Alves A. Bettini P. M. Ferreira and A. Bessani. 2019. Processing Tweets for Cybersecurity Threat Awareness. CoRR abs/1904.02072 (April 2019). http://arxiv.org/abs/1904.02072 F. Alves A. Bettini P. M. Ferreira and A. Bessani. 2019. Processing Tweets for Cybersecurity Threat Awareness. CoRR abs/1904.02072 (April 2019). http://arxiv.org/abs/1904.02072
3. Amazon. 2019. Amazon Managed Blockchain. https://aws.amazon.com/managed-blockchain/. Amazon. 2019. Amazon Managed Blockchain. https://aws.amazon.com/managed-blockchain/.
4. Prime: Byzantine Replication under Attack