共 36 条
- [11] 2-D
- [12] Cohen J., 1969, STAT POWER ANAL BEHA
- [13] Coronges K., 2012, 2012 45th Hawaii International Conference on System Sciences (HICSS), P2366, DOI 10.1109/HICSS.2012.657
- [14] Dodson Donna, 2019, Technical Report
- [15] Craigslist Scams and Community Composition: Investigating Online Fraud Victimization[J]. Garg, Vaibhav;Nilizadeh, Shirin. IEEE CS SECURITY AND PRIVACY WORKSHOPS (SPW 2013), 2013
- [16] Clear as MUD: Generating, Validating and Applying IoT Behavioral Profiles[J]. Hamza, Ayyoob;Ranathunga, Dinesha;Gharakheili, Hassan Habibi;Roughan, Matthew;Sivaraman, Vijay. PROCEEDINGS OF THE 2018 WORKSHOP ON IOT SECURITY AND PRIVACY (IOT S&P '18), 2018
- [17] Heitzmann A, 2008, LECT NOTES COMPUT SC, V5210, P18, DOI 10.1007/978-3-540-85933-8_2
- [18] Access control visualization using triangular matrices[J]. Kolomeets, Maxim;Chechulin, Andrey;Kotenko, Igor;Saenko, Igor. 2019 27TH EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND NETWORK-BASED PROCESSING (PDP), 2019
- [19] Lear Eliot, 2020, SBOM Extension for MUD
- [20] Lear Eliot, 2019, RFC 8520, DOI DOI 10.17487/RFC8520