Cited By
View all- Wu LLin NZhang KWu Y(2024)Modeling the BGP Prefix Hijack via Pollution and Recovery ProcessesBig Data and Social Computing10.1007/978-981-97-5803-6_15(253-265)Online publication date: 1-Aug-2024
- Douzet FPétiniaud LSalamatian KSamaan J(2022)Digital routes and borders in the Middle East: the geopolitical underpinnings of Internet connectivityTerritory, Politics, Governance10.1080/21622671.2022.215372611:6(1059-1080)Online publication date: 16-Dec-2022
- Mundt MBaier H(2022)Towards Mitigation of Data Exfiltration Techniques Using the MITRE ATT&CK FrameworkDigital Forensics and Cyber Crime10.1007/978-3-031-06365-7_9(139-158)Online publication date: 4-Jun-2022
- Show More Cited By