File Multi-analyses for Real-time Attack Source and Spread Site Trace
暂无分享,去创建一个
[1] Md Gapar Md Johar,et al. A Comprehensive Study on Fast image Deblurring Techniques , 2012 .
[2] Mushtaq Raza,et al. Communication Issues in GSD , 2012 .
[3] Saeid Asgari Taghanaki,et al. Nonlinear Feature Transformation and Genetic Feature Selection: Improving System Security and Decreasing Computational Cost , 2012 .
[4] Ramon Martín de Pozuelo,et al. New Framework and Mechanisms of Context‐Aware Service Composition in the Future Internet , 2013 .
[5] Gary McGraw,et al. ITS4: a static vulnerability scanner for C and C++ code , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).
[6] Martin S. Olivier,et al. The Use of File Timestamps in Digital Forensics , 2008, ISSA.