共 28 条
[1]
Ackerman Geoff, 2018, Overruled: Containing a potentially destructive adversary
[3]
Aviad A, 2015, PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015), P328
[4]
Modeling Cyber Threat Intelligence
[J].
ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY,
2020,
:273-280
[5]
Can Ozgu, 2018, International Journal of Metadata, Semantics and Ontologies, V13, P68, DOI 10.1504/ijmso.2018.096455
[6]
David J Bianco, 2014, About us
[7]
Fransiscus Dan, 2022, How to tune windows system monitor (sysmon)
[8]
Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence
[J].
2021 IEEE 37TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2021),
2021,
:193-204
[9]
HackTricks, 2023, Integrity levels
[10]
Hartong Olaf, Olafhartong/sysmon-modular: A repository of sysmon configuration modules