共 72 条
[1]
Allodi L., 2017, ONLINE SUPPLEMENT WO
[2]
Economic Factors of Vulnerability Trade and Exploitation
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:1483-1499
[6]
[Anonymous], 2013, P 2013 6 WORKSH CYB
[7]
Backes, 2019, 4 IEEE EUR S SEC PRI
[8]
Baltazar J., 2011, MORE TRAFFIC MORE MO
[9]
Beattie S, 2002, USENIX ASSOCIATION PROCEEDINGS OF THE SIXTEENTH SYSTEMS ADMINISTRATION CONFERENCE (LISA XVI), P233
[10]
Mapping the Underground: Supervised Discovery of Cybercrime Supply Chains
[J].
2019 APWG SYMPOSIUM ON ELECTRONIC CRIME RESEARCH (ECRIME),
2019,
:86-101