Author:
Sharma Amit,Gupta Brij B.,Singh Awadhesh Kumar,Saraswat V. K.
Publisher
Springer Science and Business Media LLC
Reference150 articles.
1. Adelstein F, Stillerman M, Kozen D (2002) Malicious code detection for open firmware. In 18th Annual Computer Security Applications Conference, 2002. Proceedings., pages 403–412. IEEE
2. Albanese M, Jajodia S, Noel S (2012) Time-efficient and cost-effective network hardening using attack graphs. In IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012), pages 1–12. IEEE
3. Alrabaee S, Saleem N, Preda S, Wang L, Debbabi M (2014) Oba2: an onion approach to binary code authorship attribution. Digit Investig 11:S94–S103
4. Alrabaee S, Shirani P, Debbabi M, Wang L (2016) On the feasibility of malware authorship attribution. In International Symposium on Foundations and Practice of Security, pages 256–272. Springer
5. Alshamrani A, Myneni S, Chowdhary A, Huang D (2019) A survey on advanced persistent threats: techniques, solutions, challenges, and research opportunities. IEEE Commun Surv Tutor 21(2):1851–1877
Cited by
21 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献