共 11 条
[1]
Ausanka-Crues R., METHODS ACCESS CONTR
[2]
Bai Q., 2011, P 2011 CROSS STRAIT, P830
[3]
Bell D. E., 1973, SECURE COMPUTER SYST, P74
[6]
Meshram B.B., 2018, INT J CYBER SECURITY, V7, P100
[7]
MSDN, OV WIND I O MOD
[8]
MSDN, FIL SYST FILT DRIV D
[9]
Pittman RD, 2010, HANDBOOK OF DIGITAL FORENSICS AND INVESTIGATION, P209, DOI 10.1016/B978-0-12-374267-4.00005-7
[10]
Red Hat Enterprise, LIN 7 SELINUX US ADM