Cited By
View all- Zhu YYu L(2023)Key Node Identification Based on Vulnerability Life Cycle and the Importance of Network TopologyInternational Journal of Digital Crime and Forensics10.4018/IJDCF.31710015:1(1-16)Online publication date: 20-Jan-2023
- Pauley EBarford PMcDaniel PMontpetit MLeivadeas AUhlig SJaved M(2023)The CVE Wayback Machine: Measuring Coordinated Disclosure from Exploits against Two Years of Zero-DaysProceedings of the 2023 ACM on Internet Measurement Conference10.1145/3618257.3624810(236-252)Online publication date: 24-Oct-2023
- Mohd Kassim SLi SArief B(2023)Understanding How National CSIRTs Evaluate Cyber Incident Response Tools and Data: Findings from Focus Group DiscussionsDigital Threats: Research and Practice10.1145/36092304:3(1-24)Online publication date: 6-Oct-2023
- Show More Cited By