Author of the publication

Longitudinal analysis of a large corpus of cyber threat descriptions.

, , and . J. Comput. Virol. Hacking Tech., 12 (1): 11-22 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Building a soft skill taxonomy from job openings., , , and . Soc. Netw. Anal. Min., 9 (1): 43:1-43:19 (2019)Securing the Internet of Things (IoT)., , , and . WINCOM, page 1-6. IEEE, (2018)Privacy-Preserving Relationship Path Discovery in Social Networks., , , and . CANS, volume 5888 of Lecture Notes in Computer Science, page 189-208. Springer, (2009)An empirical study of global malware encounters., , and . HotSoS, page 8:1-8:11. ACM, (2015)Analysis of Hacking Related Trade in the Darkweb., , , and . ISI, page 79-84. IEEE, (2018)STRisk: A Socio-Technical Approach to Assess Hacking Breaches Risk., , , , and . IEEE Trans. Dependable Secur. Comput., 20 (2): 1074-1087 (March 2023)A Trustable Reputation Scheme Based on Private Relationships., , , , and . ASONAM, page 19-24. IEEE Computer Society, (2009)A Data-driven Characterization of Modern Android Spyware., , , , and . ACM Trans. Manag. Inf. Syst., 11 (1): 4:1-4:38 (2020)Remote assessment of countries' nuclear, biological, and cyber capabilities: joint motivation and latent capability approach., , , and . Soc. Netw. Anal. Min., 5 (1): 5:1-5:21 (2015)Longitudinal analysis of a large corpus of cyber threat descriptions., , and . J. Comput. Virol. Hacking Tech., 12 (1): 11-22 (2016)