共 64 条
[1]
A Cyber Kill Chain Approach for Detecting Advanced Persistent Threats
[J].
CMC-COMPUTERS MATERIALS & CONTINUA,
2021, 67 (02)
:2497-2513
[5]
Alsanad A, 2022, INT J ADV COMPUT SC, V13, P640
[6]
Appelbaum D., 2017, **DATA OBJECT**, DOI 10.7282/T3R49TQ2
[7]
Dynamic security management driven by situations: An exploratory analysis of logs for the identification of security situations
[J].
2019 3RD CYBER SECURITY IN NETWORKING CONFERENCE (CSNET),
2019,
[10]
Calderon T.G., 2002, International Journal of Accounting Information Systems, V3, P203, DOI DOI 10.1016/S1467-0895(02)00068-4