Cited By
View all- Wang YShi Y(2024)Detecting the penetration of malicious behavior in big data using hybrid algorithmsSignal, Image and Video Processing10.1007/s11760-024-03203-318:S1(919-933)Online publication date: 13-May-2024
- Ma BYang YLi JZhang FShen WZhou YMa JMeng WJensen CCremers CKirda E(2023)Travelling the Hypervisor and SSD: A Tag-Based Approach Against Crypto Ransomware with Fine-Grained Data RecoveryProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3616665(341-355)Online publication date: 15-Nov-2023
- Ilg NDuplys PSisejkovic DMenth M(2023)A survey of contemporary open-source honeypots, frameworks, and toolsJournal of Network and Computer Applications10.1016/j.jnca.2023.103737220(103737)Online publication date: Nov-2023
- Show More Cited By