共 38 条
[1]
A M, 2016, International Journal of Computer Applications, V141, P46, DOI [10.5120/ijca2016909784, 10.5120/ijca2016909784, DOI 10.5120/IJCA2016909784]
[2]
Alperovitch D., 2011, REVEALED OPERATION S, V3, P2011
[3]
Assante M.J., 2015, The Industrial Control System Cyber Kill Chain
[4]
A baseline for unsupervised advanced persistent threat detection in system-level provenance
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2020, 108
:401-413
[5]
Brand M, 2010, J DIGIT FORENSICS SE, V5, P31
[7]
A Method of Monitoring and Detecting APT Attacks Based on Unknown Domains
[J].
PROCEEDINGS OF THE 13TH INTERNATIONAL SYMPOSIUM INTELLIGENT SYSTEMS 2018 (INTELS'18),
2019, 150
:316-323
[8]
Eke Hope, 2020, International Journal of Systems and Software Security and Protection, V11, P13, DOI [10.4018/ijsssp.2020070102, 10.4018/IJSSSP.2020070102]
[9]
Eke H., 2020, P 13 INT C SEC INF N, DOI [10.1145/3433174.3433615, DOI 10.1145/3433174.3433615]
[10]
Eke H.N., 2016, STUDY WEB BASED COMM, P1