共 45 条
- [1] [Anonymous], SECURITY EC INTERNAL
- [2] [Anonymous], 2007, Complete guide to security and privacy metrics: measuring regulatory compliance, operational resilience, and ROI
- [3] Barnum S., 2012, Standardizing Cyber Threat Intelligence Information with the Structured Threat Information Expression (stix), V11, P1
- [4] Bradbery J., 2021, Oxford Advanced Learner's Dictionary.
- [6] Investigating Sharing of Cyber Threat Intelligence and Proposing A New Data Model for Enabling Automation in Knowledge Representation and Exchange [J]. DIGITAL THREATS: RESEARCH AND PRACTICE, 2022, 3 (01):
- [7] Brown S., 2015, WISCS 15, P43
- [8] Metrics and Indicators of Information Security Incident Management: A Systematic Mapping Study [J]. DEVELOPMENTS AND ADVANCES IN DEFENSE AND SECURITY, 2020, 152 : 507 - 519
- [9] Chismon David., Threat Intelligence: Collecting, Analysing, Evaluating
- [10] Bayesian Network Models in Cyber Security: A Systematic Review [J]. SECURE IT SYSTEMS, NORDSEC 2017, 2017, 10674 : 105 - 122