Cited By
View all- Moura GDaniels TBosteels MCastro SMüller MWabeke Tvan den Hout TKorczyński MSmaragdakis GLuo BLiao XXu JKirda ELie D(2024)Characterizing and Mitigating Phishing Attacks at ccTLD ScaleProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690192(2147-2161)Online publication date: 2-Dec-2024
- Phillips JChow YRogers HBlaszczynski A(2024)The search term ‘suicide’ is being used to lead web browsers to online casinosBehaviour & Information Technology10.1080/0144929X.2023.229830743:16(4033-4044)Online publication date: 5-Jan-2024
- Zhang FZhang YLiu BAlowaisheq EYing LLi XZhang ZLiu YDuan HZhang MMontpetit MLeivadeas AUhlig SJaved M(2023)Wolf in Sheep's Clothing: Evaluating Security Risks of the Undelegated Record on DNS Hosting ServicesProceedings of the 2023 ACM on Internet Measurement Conference10.1145/3618257.3624839(188-197)Online publication date: 24-Oct-2023
- Show More Cited By