Cited By
View all- Satvat KGjomemo RVenkatakrishnan VVilela JSchulmann HLi N(2024)TIPCE: A Longitudinal Threat Intelligence Platform Comprehensiveness AnalysisProceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy10.1145/3626232.3653278(349-360)Online publication date: 19-Jun-2024
- Patel KShafiq ZNogueira MMenasché DLovat EKashif TWoiwood AMartins M(2024)Harnessing TI Feeds for Exploitation Detection2024 IEEE International Conference on Cyber Security and Resilience (CSR)10.1109/CSR61664.2024.10679417(200-207)Online publication date: 2-Sep-2024
- Li VAkiwate GLevchenko KVoelker GSavage S(2021)Clairvoyance: Inferring Blocklist Use on the InternetPassive and Active Measurement10.1007/978-3-030-72582-2_4(57-75)Online publication date: 30-Mar-2021
- Show More Cited By