Cited By
View all- Li YLi JCao JXie RWang YXu MLuo BLiao XXu JKirda ELie D(2024)Poster: Few-Shot Inter-Domain Routing Threat Detection with Large-Scale Multi-Modal Pre-TrainingProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3691402(4970-4972)Online publication date: 2-Dec-2024
- Salamatian LVermeulen KCunha IGiotsas VKatz-Bassett EVallina-Rodríguez NSuarez-Tángil GLevin DPelsser C(2024)metAScritic: Reframing AS-Level Topology Discovery as a Recommendation SystemProceedings of the 2024 ACM on Internet Measurement Conference10.1145/3646547.3688429(337-364)Online publication date: 4-Nov-2024
- Cimaszewski GBirge-Lee HWang LRexford JMittal PCalandrino JTroncoso C(2023)How effective is multiple-vantage-point domain control validation?Proceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620556(5701-5718)Online publication date: 9-Aug-2023
- Show More Cited By