Cited By
View all- Allegretta MSiracusano GGonzález RGramaglia MCaballero J(2025)Web of shadows: Investigating malware abuse of internet servicesComputers & Security10.1016/j.cose.2024.104182149(104182)Online publication date: Mar-2025
- Labrèche FMariconti EStringhini G(2022)Shedding Light on the Targeted Victim Profiles of Malicious DownloadersProceedings of the 17th International Conference on Availability, Reliability and Security10.1145/3538969.3544435(1-10)Online publication date: 23-Aug-2022
- Huh SCho SChoi JShin SLee H(2022)A Comprehensive Analysis of Today’s Malware and Its Distribution Network: Common Adversary Strategies and ImplicationsIEEE Access10.1109/ACCESS.2022.317122610(49566-49584)Online publication date: 2022
- Show More Cited By