Cited By
View all- Paladini TFerro LPolino MZanero SCarminati M(2024)You Might Have Known It Earlier: Analyzing the Role of Underground Forums in Threat IntelligenceProceedings of the 27th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3678890.3678930(368-383)Online publication date: 30-Sep-2024
- Chatziamanetoglou DRantos K(2023)Blockchain-Based Cyber Threat Intelligence Sharing Using Proof-of-Quality ConsensusSecurity and Communication Networks10.1155/2023/33031222023Online publication date: 1-Jan-2023
- Morgese Zangrandi LVan Ede TBooij TSciancalepore SAllodi LContinella A(2022)Stepping out of the MUD: Contextual threat information for IoT devices with manufacturer-provided behavior profilesProceedings of the 38th Annual Computer Security Applications Conference10.1145/3564625.3564644(467-480)Online publication date: 5-Dec-2022
- Show More Cited By