共 52 条
- [11] DARPA, 2021, Operationally transparent cyber (optc) data release
- [12] Gehani Ashish, 2012, Middleware 2012. ACM/IFIP/USENIX 13th International Middleware Conference. Proceedings, P101, DOI 10.1007/978-3-642-35170-9_6
- [13] VulinOSS: A Dataset of Security Vulnerabilities in Open-source Systems [J]. 2018 IEEE/ACM 15TH INTERNATIONAL CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR), 2018, : 18 - 21
- [14] Hassan WU, 2020, ANN COMP SEC APPL C
- [15] Combating Dependence Explosion in Forensic Analysis Using Alternative Tag Propagation Semantics [J]. 2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), 2020, : 1139 - 1155
- [16] Hossain MN, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P1723
- [17] Hossain MN, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P487
- [18] SoK: History is a Vast Early Warning System: Auditing the Provenance of System Intrusions [J]. 2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2023, : 2620 - 2638
- [19] Millions of Targets Under Attack: a Macroscopic Characterization of the DoS Ecosystem [J]. PROCEEDINGS OF THE 2017 INTERNET MEASUREMENT CONFERENCE (IMC'17), 2017, : 100 - 113
- [20] Kim D, 2020, arXiv