Cited By
View all- Al lelah TTheodorakopoulos GJaved AAnthi E(2023)Machine Learning Detection of Cloud Services Abuse as C&C InfrastructureJournal of Cybersecurity and Privacy10.3390/jcp30400393:4(858-881)Online publication date: 1-Dec-2023
- Al lelah TTheodorakopoulos GReinecke PJaved AAnthi E(2023)Abuse of Cloud-Based and Public Legitimate Services as Command-and-Control (C&C) Infrastructure: A Systematic Literature ReviewJournal of Cybersecurity and Privacy10.3390/jcp30300273:3(558-590)Online publication date: 1-Sep-2023
- Lou JZhang XZhang YLi XYuan XZhang N(2023)Devils in Your Apps: Vulnerabilities and User Privacy Exposure in Mobile Notification Systems2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)10.1109/DSN58367.2023.00017(28-41)Online publication date: Jun-2023
- Show More Cited By