Cited By
View all- Alqadhi MMohaisen D(2024)The Infrastructure Utilization of Free Contents Websites Reveal Their Security CharacteristicsComputational Data and Social Networks10.1007/978-981-97-0669-3_24(255-267)Online publication date: 29-Feb-2024
- Hammouchi HNejjari NMezzour GGhogho MBenbrahim H(2023)STRisk: A Socio-Technical Approach to Assess Hacking Breaches RiskIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.314920820:2(1074-1087)Online publication date: 1-Mar-2023
- Faulkenberry AAvgetidis AMa ZAlrawi OLever CKintis PMonrose FKeromytis AAntonakakis M(2022)View from Above: Exploring the Malware Ecosystem from the Upper DNS HierarchyProceedings of the 38th Annual Computer Security Applications Conference10.1145/3564625.3564646(240-250)Online publication date: 5-Dec-2022
- Show More Cited By