Practical Problems of Internet Threats Analyses
暂无分享,去创建一个
[1] Krzysztof Cabaj,et al. Exploring the Space of System Monitoring , 2013, Intelligent Tools for Building a Scientific Information Platform.
[2] Barry E. Mullins,et al. Evaluation of the ability of the Shodan search engine to identify Internet-facing industrial control devices , 2014, Int. J. Crit. Infrastructure Prot..
[3] Krzysztof Cabaj,et al. HoneyPot systems in practice , 2015 .
[4] Ross J. Anderson. Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .
[5] P. Gawkowski,et al. Checking of fault susceptibility of cryptographic algorithms , 2009 .
[6] Krzysztof Cabaj,et al. Management and Analytical Software for Data Gathered from HoneyPot System , 2013 .
[7] Jian Xu,et al. A similarity metric method of obfuscated malware using function-call graph , 2012, Journal of Computer Virology and Hacking Techniques.
[8] Hiroshi Fujinoki,et al. A Survey: Recent Advances and Future Trends in Honeypot Research , 2012 .
[9] Felix C. Freiling,et al. The Nepenthes Platform: An Efficient Approach to Collect Malware , 2006, RAID.