共 29 条
[1]
[Anonymous], 2013, Operation Ke3chang: targeted attacks against ministries of foreign affairs
[2]
[Anonymous], 2011, Assessing outbound traffic to uncover advanced persistent threat, P35
[3]
[Anonymous], 2015, World most popular data breaches
[4]
[Anonymous], The 15 biggest data breaches of the 21st century
[5]
[Anonymous], 2014, FireEye advanced threat report., P22
[6]
[Anonymous], 2011, NIST SP 800-39., P88
[8]
Chafir, 2014, INT J ADV COMPUTER N, V4, P50, DOI DOI 10.15224/978-1-63248-005-7-55
[9]
Chen P, 2014, LECT NOTES COMPUT SC, V8735, P63, DOI 10.1007/978-3-662-44885-4_5
[10]
A Method of Monitoring and Detecting APT Attacks Based on Unknown Domains
[J].
PROCEEDINGS OF THE 13TH INTERNATIONAL SYMPOSIUM INTELLIGENT SYSTEMS 2018 (INTELS'18),
2019, 150
:316-323