共 25 条
- [11] Bidou R., 2005, Security operation center concepts & implementation
- [12] Burnham J., WHAT IS SECURITY INT
- [13] Cichonski P, 2012, COMPUTER SECURITY IN, V61, P1, DOI DOI 10.6028/NIST.SP.800-61R2
- [14] Fry C., 2009, Security Monitoring: Proven Methods for Incident Detection on Enterprise Networks
- [15] Hamilton M., 2014, CYBER DEFENSE MAGAZI, P41
- [16] Hutchins E.M., 2013, Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains
- [17] IBM Corporation, 2010, IT SEC COMPL MAN DES
- [18] Insights on governance risk and compliance, 2014, SEC OP CTR HELP YOU
- [19] SOC- and SIC-Based Information Security Monitoring [J]. RECENT ADVANCES IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 2, 2017, 570 : 364 - 374
- [20] Information Security Maintenance Issues for Big Security-Related Data [J]. 2014 INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD), 2014, : 361 - 366