Author:
Liu Wei,Gao Peng,Zhang Haotian,Li Ke,Yang Weiyong,wei xingshen,Shu jiwu
Reference39 articles.
1. A systematic survey on multi-step attack detection;Julio Navarro;Computers & Security,2018
2. Automated behavioral analysis of malware: A case study of wannacry ransomware;Qian Chen;2017 16th IEEE International Conference on machine learning and applications (ICMLA),2017
3. Software supply chain attacks, a threat to global cybersecurity: Solarwinds' case study;Jeferson Mart�nez;International Journal of Safety and Security Engineering,2021
4. Advanced social engineering attacks;Katharina Krombholz;Journal of Information Security and applications,2015
5. {SLEUTH}: Real-time attack scenario reconstruction from {COTS} audit data;Md Nahid Hossain;26th USENIX Security Symposium (USENIX Security 17),2017