Click here to download all references as Bib-File.•
| 2021-09-01
⋅
YouTube (Black Hat)
⋅
How Did the Adversaries Abusing the Bitcoin Blockchain Evade Our Takeover? Cerber Pony |
| 2021-05-06
⋅
Black Hat
⋅
How Did the Adversaries Abusing Bitcoin Blockchain Evade Our Takeover Cerber Pony |
| 2020-07-14
⋅
International Journal of Intelligence and Counter Intelligence
⋅
Cyber Threat Intelligence: A Product Without aProcess? |