Cited By
View all- Alghureid AMohaisen D(2025)Simple Perturbations Subvert Ethereum Phishing Transactions Detection: An Empirical AnalysisInformation Security Applications10.1007/978-981-96-1624-4_10(123-137)Online publication date: 5-Feb-2025
- G SFaloutsos M(2024)MalFusion: Simple String Manipulations Confuse Malware Detection2024 IFIP Networking Conference (IFIP Networking)10.23919/IFIPNetworking62109.2024.10619782(113-121)Online publication date: 3-Jun-2024
- Jin HJeon GAneka Choi HJeon SSeo J(2024)A Threat Modeling Framework for IoT-Based Botnet AttacksHeliyon10.1016/j.heliyon.2024.e39192(e39192)Online publication date: Oct-2024