Al lelah, T.; Theodorakopoulos, G.; Reinecke, P.; Javed, A.; Anthi, E.
Abuse of Cloud-Based and Public Legitimate Services as Command-and-Control (C&C) Infrastructure: A Systematic Literature Review. J. Cybersecur. Priv. 2023, 3, 558-590.
https://doi.org/10.3390/jcp3030027
AMA Style
Al lelah T, Theodorakopoulos G, Reinecke P, Javed A, Anthi E.
Abuse of Cloud-Based and Public Legitimate Services as Command-and-Control (C&C) Infrastructure: A Systematic Literature Review. Journal of Cybersecurity and Privacy. 2023; 3(3):558-590.
https://doi.org/10.3390/jcp3030027
Chicago/Turabian Style
Al lelah, Turki, George Theodorakopoulos, Philipp Reinecke, Amir Javed, and Eirini Anthi.
2023. "Abuse of Cloud-Based and Public Legitimate Services as Command-and-Control (C&C) Infrastructure: A Systematic Literature Review" Journal of Cybersecurity and Privacy 3, no. 3: 558-590.
https://doi.org/10.3390/jcp3030027
APA Style
Al lelah, T., Theodorakopoulos, G., Reinecke, P., Javed, A., & Anthi, E.
(2023). Abuse of Cloud-Based and Public Legitimate Services as Command-and-Control (C&C) Infrastructure: A Systematic Literature Review. Journal of Cybersecurity and Privacy, 3(3), 558-590.
https://doi.org/10.3390/jcp3030027