共 432 条
[91]
Byres EJ, P INT INFR SURV WORK
[92]
Caire P, 2013, S VIS LANG HUM CEN C, P115, DOI 10.1109/RE.2013.6636711
[93]
Caltagirone Sergio, 2013, The Diamond Model of Intrusion Analysis
[94]
Campean F., 2008, 01487191 SAE
[95]
Cervesato I, 2007, IEEE T DEPEND SECURE, V4, P216, DOI [10.1109/TDSC.2007.70206, 10.1109/TDSC.2007.70206.]
[97]
Chandra B., 2014, TECHNICAL REPORT
[98]
Chaufette N., 2007, TECHNICAL REPORT
[99]
Chen F, 2008, PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, P426, DOI 10.1109/ISECS.2008.122
[100]
Chen F, 2009, LECT NOTES COMPUT SC, V5429, P150