Graph-theoretic characterization of cyber-threat infrastructures. Boukhtouta, A., Mouheb, D., Debbabi, M., Alfandi, O., Iqbal, F., & Barachi, M. E. Digit. Investig., 14 Supplement 1:S3–S15, 2015. Paper doi bibtex @article{DBLP:journals/di/BoukhtoutaMDAIB15,
author = {Amine Boukhtouta and
Djedjiga Mouheb and
Mourad Debbabi and
Omar Alfandi and
Farkhund Iqbal and
May El Barachi},
title = {Graph-theoretic characterization of cyber-threat infrastructures},
journal = {Digit. Investig.},
volume = {14 Supplement 1},
pages = {S3--S15},
year = {2015},
url = {https://doi.org/10.1016/j.diin.2015.05.002},
doi = {10.1016/J.DIIN.2015.05.002},
timestamp = {Tue, 07 May 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/di/BoukhtoutaMDAIB15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"L9p25qMfRAjMyR3cR","bibbaseid":"boukhtouta-mouheb-debbabi-alfandi-iqbal-barachi-graphtheoreticcharacterizationofcyberthreatinfrastructures-2015","author_short":["Boukhtouta, A.","Mouheb, D.","Debbabi, M.","Alfandi, O.","Iqbal, F.","Barachi, M. E."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Amine"],"propositions":[],"lastnames":["Boukhtouta"],"suffixes":[]},{"firstnames":["Djedjiga"],"propositions":[],"lastnames":["Mouheb"],"suffixes":[]},{"firstnames":["Mourad"],"propositions":[],"lastnames":["Debbabi"],"suffixes":[]},{"firstnames":["Omar"],"propositions":[],"lastnames":["Alfandi"],"suffixes":[]},{"firstnames":["Farkhund"],"propositions":[],"lastnames":["Iqbal"],"suffixes":[]},{"firstnames":["May","El"],"propositions":[],"lastnames":["Barachi"],"suffixes":[]}],"title":"Graph-theoretic characterization of cyber-threat infrastructures","journal":"Digit. Investig.","volume":"14 Supplement 1","pages":"S3–S15","year":"2015","url":"https://doi.org/10.1016/j.diin.2015.05.002","doi":"10.1016/J.DIIN.2015.05.002","timestamp":"Tue, 07 May 2024 01:00:00 +0200","biburl":"https://dblp.org/rec/journals/di/BoukhtoutaMDAIB15.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/di/BoukhtoutaMDAIB15,\n author = {Amine Boukhtouta and\n Djedjiga Mouheb and\n Mourad Debbabi and\n Omar Alfandi and\n Farkhund Iqbal and\n May El Barachi},\n title = {Graph-theoretic characterization of cyber-threat infrastructures},\n journal = {Digit. Investig.},\n volume = {14 Supplement 1},\n pages = {S3--S15},\n year = {2015},\n url = {https://doi.org/10.1016/j.diin.2015.05.002},\n doi = {10.1016/J.DIIN.2015.05.002},\n timestamp = {Tue, 07 May 2024 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/di/BoukhtoutaMDAIB15.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Boukhtouta, A.","Mouheb, D.","Debbabi, M.","Alfandi, O.","Iqbal, F.","Barachi, M. E."],"key":"DBLP:journals/di/BoukhtoutaMDAIB15","id":"DBLP:journals/di/BoukhtoutaMDAIB15","bibbaseid":"boukhtouta-mouheb-debbabi-alfandi-iqbal-barachi-graphtheoreticcharacterizationofcyberthreatinfrastructures-2015","role":"author","urls":{"Paper":"https://doi.org/10.1016/j.diin.2015.05.002"},"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"https://dblp.org/pid/47/477.bib","dataSources":["dXMgpM5D4sEbyTbP6"],"keywords":[],"search_terms":["graph","theoretic","characterization","cyber","threat","infrastructures","boukhtouta","mouheb","debbabi","alfandi","iqbal","barachi"],"title":"Graph-theoretic characterization of cyber-threat infrastructures","year":2015}