共 17 条
- [1] Abu S., 2018, INDONES J ELECT ENG, V10, P371
- [3] Dowling S, 2017, INT CONF INTERNET, P349, DOI 10.23919/ICITST.2017.8356416
- [4] Du H., 2013, HDB COMPUTATIONAL AP, P559
- [5] Eian I. C., 2020, Cyber attacks in the era of covid-19 and possible solution domains
- [6] Integrating Threat Intelligence to Enhance an Organization's Information Security Management [J]. 13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
- [7] Guardian T., PETYA RANSOMWARE ATT
- [8] Heeringa W. J., 2004, Measuring dialect pronunciation differences using Levenshtein distance
- [9] Husak M., 2020, INT C UK CHINA EMERG, P1
- [10] Johns E., 2020, CYBER SECURITY BREAC