共 26 条
[1]
Barnum S., 2012, Mitre Corporation, V11, P1
[2]
Barre⠁re M., 2017, 2017 13 INT C NETWOR, P1
[4]
CISA, 2019, RISK VULN ASS RVA MA
[5]
de Braekt RI, 2016, 2016 4TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), P68, DOI 10.1109/ISDFS.2016.7473520
[7]
Finnerty K., 2019, CYBER SECURITY BREAC
[9]
HARSANYI JC, 1972, MANAGE SCI B-APPL, V18, pP80
[10]
A game-theoretic defensive approach for forensic investigators against rootkits
[J].
FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION,
2020, 33