共 37 条
[31]
Shackleford D., 2015, Who's Using Cyberthreat Intelligence and How
[32]
Sochor T, 2014, STUDY INTERNET THREA, P118
[33]
Sokol P, 2015, P SEC PROT INF U DEF
[34]
United States. Joint Chiefs of Staff, 2000, JOINT TACT TECHN PRO
[35]
van der Lelie-jop J, 2012, VISUAL ANAL APPROACH
[36]
Honeypots for distributed Denial of Service Attacks
[J].
WET ICE 2002: ELEVENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS,
2002,
:109-114
[37]
Xiaoli Lin, 2009, 2009 International Conference on Computational Science and Engineering (CSE), P486, DOI 10.1109/CSE.2009.372