Author:
Edwards Benjamin,Moore Tyler,Stelle George,Hofmeyr Steven,Forrest Stephanie
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Detecting Malware Activity Using Public Search Data;2022 IEEE International Conference on Big Data (Big Data);2022-12-17
2. Abuse Reporting and the Fight Against Cybercrime;ACM Computing Surveys;2017-12-31
3. Mixing Coins of Different Quality: A Game-Theoretic Approach;Financial Cryptography and Data Security;2017
4. Hype and heavy tails: A closer look at data breaches;Journal of Cybersecurity;2016-12-01
5. Analyzing and Modeling Longitudinal Security Data;Proceedings of the 31st Annual Computer Security Applications Conference;2015-12-07