共 9 条
[1]
De Faveri C., 2016, P 2016 IEEE INT C SO, P77
[3]
Koniaris I, 2013, 2013 IEEE EUROCON, P65, DOI 10.1109/EUROCON.2013.6624967
[6]
Profiling attacker behavior following SSH compromises
[J].
37TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS,
2007,
:119-+
[7]
Sochor T, 2014, COMM COM INF SC, V431, P118
[8]
Valli Craig, 2012, CYBERSPACE SAFETY SE, P227
[9]
Visoottiviseth V., 2011, 8 INT JOINT C COMP S, P23