• Wu L, Lin N, Zhang K and Wu Y. (2024). Modeling the BGP Prefix Hijack via Pollution and Recovery Processes. Big Data and Social Computing. 10.1007/978-981-97-5803-6_15. (253-265).

    https://link.springer.com/10.1007/978-981-97-5803-6_15

  • Douzet F, Pétiniaud L, Salamatian K and Samaan J. (2022). Digital routes and borders in the Middle East: the geopolitical underpinnings of Internet connectivity. Territory, Politics, Governance. 10.1080/21622671.2022.2153726. 11:6. (1059-1080). Online publication date: 18-Aug-2023.

    https://www.tandfonline.com/doi/full/10.1080/21622671.2022.2153726

  • Mundt M and Baier H. (2022). Towards Mitigation of Data Exfiltration Techniques Using the MITRE ATT&CK Framework. Digital Forensics and Cyber Crime. 10.1007/978-3-031-06365-7_9. (139-158).

    https://link.springer.com/10.1007/978-3-031-06365-7_9

  • Salamatian L, Douzet F, Salamatian K and Limonier K. (2021). The geopolitics behind the routes data travel: a case study of Iran. Journal of Cybersecurity. 10.1093/cybsec/tyab018. 7:1. Online publication date: 17-Aug-2021.

    https://academic.oup.com/cybersecurity/article/doi/10.1093/cybsec/tyab018/6353268

  • Douzet F, Petiniaud L, Salamatian L, Limonier K, Salamatian K and Alchus T. (2020). Measuring the Fragmentation of the Internet: The Case of the Border Gateway Protocol (BGP) During the Ukrainian Crisis 2020 12th International Conference on Cyber Conflict (CyCon). 10.23919/CyCon49761.2020.9131726. 9789-949-9904-7-4. (157-182).

    https://ieeexplore.ieee.org/document/9131726/