Towards a definition of cyberspace tactics, techniques and procedures
暂无分享,去创建一个
Scott D. Lathrop | Scott Lathrop | Randolph M. Jones | Randolph M. Jones | Robert Bixler | Fernando Maymi | Fernando Maymi | Robert Bixler
[1] Douglas Otis,et al. Operation Pawn Storm Using Decoys to Evade Detection , 2014 .
[2] Andrew P. Moore,et al. Attack Modeling for Information Security and Survivability , 2001 .
[3] Eric Michael Hutchins,et al. Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains , 2010 .
[4] J. A. Battaglia,et al. Finding Cyber Threats with ATT&CK-Based Analytics , 2017 .