Cited By
View all- Stevens KErdemir MZhang HKim TPearce P(2024)BluePrint: Automatic Malware Signature Generation for Internet ScanningProceedings of the 27th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3678890.3678923(197-214)Online publication date: 30-Sep-2024
- Zha MLin ZTang SLiao XNan YWang XLuo BLiao XXu JKirda ELie D(2024)Understanding Cross-Platform Referral Traffic for Illicit Drug PromotionProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3670383(2132-2146)Online publication date: 2-Dec-2024
- Liu EKappos GMugnier EInvernizzi LSavage STao DThomas KVoelker GMeiklejohn SVallina-Rodríguez NSuarez-Tángil GLevin DPelsser C(2024)Give and Take: An End-To-End Investigation of Giveaway Scam Conversion RatesProceedings of the 2024 ACM on Internet Measurement Conference10.1145/3646547.3689005(704-712)Online publication date: 4-Nov-2024
- Show More Cited By