共 39 条
[2]
Almeshekah M.H., 2014, Proceedings of the 2014 workshop on New Security Paradigms Workshop-NSPW'14, P127, DOI [10.1145/2683467.2683482, DOI 10.1145/2683467.2683482]
[3]
Almotairi S., 2009, THESIS
[4]
Anna-senpai, 2016, MIRAI SOURCE CODE
[5]
[Anonymous], EUR C CYB WARF SEC
[6]
[Anonymous], INT C SOFTW TEL COMP
[7]
[Anonymous], ADV SCI TECHNOLOGY E
[8]
Baecher P., 2006, MWCOLLECT ALLIANCE C
[9]
Berthier R., 2009, INT C DEP SYST NETW, V39
[10]
Data Mining Algorithms in the Analysis of Security Logs from a Honeypot System
[J].
DEPENDABILITY ENGINEERING AND COMPLEX SYSTEMS,
2016, 470
:63-73