Industrial Espionage and Targeted Attacks: Understanding the Characteristics of an Escalating Threat
暂无分享,去创建一个
Leyla Bilge | Olivier Thonnard | Gavin O'Gorman | Seán Kiernan | Martin Lee | G. O'Gorman | Leyla Bilge | O. Thonnard | Seán Kiernan | Martin Lee | Olivier Thonnard
[1] Jesse D. Kornblum. Identifying almost identical files using context triggered piecewise hashing , 2006, Digit. Investig..
[2] Lorrie Faith Cranor,et al. Decision strategies and susceptibility to phishing , 2006, SOUPS '06.
[3] Van-Hau Pham,et al. The WOMBAT Attack Attribution Method: Some Results , 2009, ICISS.
[4] Angelos D. Keromytis,et al. An Analysis of Rogue AV Campaigns , 2010, RAID.
[5] Marc Dacier,et al. On a multicriteria clustering approach for attack attribution , 2010, SKDD.
[6] Marc Dacier,et al. A strategic analysis of spam botnets operations , 2011, CEAS '11.
[7] Tudor Dumitras,et al. Toward a standard benchmark for computer security research: the worldwide intelligence network environment (WINE) , 2011, BADGERS '11.