共 24 条
- [1] Abdou AbdelRahman, 2016, Technology and Practice of Passwords. 9th International Conference, PASSWORDS 2015. Proceedings: LNCS 9551, P72, DOI 10.1007/978-3-319-29938-9_6
- [2] [Anonymous], 2022, VirusTotal
- [3] Picky Attackers: Quantifying the Role of System Properties on Intruder Behavior [J]. 33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017), 2017, : 387 - 398
- [4] Bullock J., 2017, WIRESHARK R SECURITY
- [6] A Survey of Honeypots and Honeynets for Internet of Things, Industrial Internet of Things, and Cyber-Physical Systems [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2021, 23 (04): : 2351 - 2383
- [7] Ghiëtte V, 2019, PROCEEDINGS OF THE 22ND INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, P61
- [8] Examining Mirai's Battle over the Internet of Things [J]. CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2020, : 743 - 755
- [9] Melese Solomon Z., 2016, International Journal of Computer Network and Information Security, V8, P19, DOI 10.5815/ijcnis.2016.09.03
- [10] Set-up and deployment of a high-interaction honeypot: experiment and lessons learned [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2011, 7 (02): : 143 - 157