共 52 条
- [21] King S. T., 2003, Operating Systems Review, V37, P223, DOI 10.1145/1165389.945467
- [22] Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 100 : 779 - 796
- [23] Lee KH, 2013, CCS, P1005
- [24] Lee KH, 2013, 20 ANN NETW DISTR SY
- [25] Lippmann R, 2000, P DARPA INF SURV C E, V2, P12
- [26] Towards a Timely Causality Analysis for Enterprise Security [J]. 25TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2018), 2018,
- [27] Ma S, 2015, ACSAC 2015, DOI [10.1145/2818000.2818039, DOI 10.1145/2818000.2818039]
- [28] ProTracer: Towards Practical Provenance Tracing by Alternating Between Logging and Tainting [J]. 23RD ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2016), 2016,
- [29] Magazine S, 2021, Now ransomware is inundating public school systems
- [30] Marcelli A, 2022, PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, P2099