共 67 条
[31]
Circumventing iOS security mechanisms for APT forensic investigations: A security taxonomy for cloud apps
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2018, 79
:247-261
[32]
Franklin L, 2017, S VISUALIZATION CYBE, P1
[33]
Cyber security information exchange to gain insight into the effects of cyber threats and incidents
[J].
ELEKTROTECHNIK UND INFORMATIONSTECHNIK,
2015, 132 (02)
:106-112
[34]
Detection of advanced persistent threat using machine-learning correlation analysis
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2018, 89
:349-359
[35]
Dynamic risk management response system to handle cyber threats
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2018, 83
:535-552
[36]
Han J, 2012, MOR KAUF D, P1
[37]
Hybrids of support vector machine wrapper and filter based framework for malware detection
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2016, 55
:376-390
[38]
Hutchins E, 2011, PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, P113
[39]
Jeffreys H., 1974, Scientific inference, VThird
[40]
Extracting Cybersecurity Related Linked Data from Text
[J].
2013 IEEE SEVENTH INTERNATIONAL CONFERENCE ON SEMANTIC COMPUTING (ICSC 2013),
2013,
:252-259