Cited By
View all- Barradas DNovo CPortela BRomeiro SSantos N(2024)Extending C2 Traffic Detection Methodologies: From TLS 1.2 to TLS 1.3-enabled MalwareProceedings of the 27th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3678890.3678921(181-196)Online publication date: 30-Sep-2024
- Saad MMohaisen D(2024)Analyzing In-Browser CryptojackingIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2024.337753321:6(5448-5460)Online publication date: Nov-2024
- Spahn NHanke NHolz TKruegel CVigna G(2023)Container Orchestration Honeypot: Observing Attacks in the WildProceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3607199.3607205(381-396)Online publication date: 16-Oct-2023
- Show More Cited By