共 53 条
- [1] A Cyber Kill Chain Approach for Detecting Advanced Persistent Threats [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 67 (02): : 2497 - 2513
- [2] Cyber-Attack Modeling Analysis Techniques: An Overview [J]. 2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD WORKSHOPS (FICLOUDW), 2016, : 69 - 76
- [3] Al-Shaer R, 2020, Arxiv, DOI arXiv:2005.01654
- [4] Alavizadeh H., 2021, ARXIV
- [5] Aljamal I, 2019, 2019 IEEE/ACIS 17TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH, MANAGEMENT AND APPLICATIONS (SERA), P84, DOI [10.1109/sera.2019.8886794, 10.1109/SERA.2019.8886794]
- [6] [Anonymous], 2013, CYBER INTELLIGENCE T
- [7] [Anonymous], 2012, Guide for conducting risk assessments, DOI DOI 10.6028/NIST.SP.800-30R1
- [8] [Anonymous], 2005, NIST SP, DOI [10.6028/NIST.SP.800-40ver2, DOI 10.6028/NIST.SP.800-40VER2]
- [9] [Anonymous], 2006, INFORM SCI STAT
- [10] [Anonymous], 2021, VULNERABILITY MANAGE