共 52 条
- [1] Aldribi A, 2018, STUD BIG DATA, V39, P333, DOI 10.1007/978-3-319-73676-1_13
- [2] Analyzing the Usefulness of the DARPA OpTC Dataset in Cyber Threat Detection Research [J]. PROCEEDINGS OF THE 26TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2021, 2021, : 27 - 32
- [3] [Anonymous], 2020, Nature, DOI 10.1038/d41586-020-00154-w
- [4] [Anonymous], 2021, Bloomberg
- [5] Balakrishnan N, 2013, 5 USENIX WORKSH THEO
- [6] Banadaki YM, 2020, Journal of Computer Sciences and Applications, V8, P46, DOI [10.12691/jcsa-8-2-2, DOI 10.12691/JCSA-8-2-2]
- [7] Bates A, 2015, PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, P319
- [8] Chan SC, 2017, 9 USENIX WORKSH THEO
- [9] Cheng Z, 2024, IEEE S SEC PRIV SP
- [10] CNN, 2021, Kaseya ransomware attack businesses affected