Author:
Decanio Samuel,Soltys Michael,Hildreth Kimo
Reference5 articles.
1. The problem of attribution in cyber security;Kumar Goutam;International Journal of Computer Applications,2015
2. Jeff Kline, Paul Barford, Aaron Cahn, and Joel Sommers. On the structure and characteristics of user agent string. In Proceedings of the 2017 Internet Measurement Conference, IMC ‘17, pages 184–190, New York, NY, USA, 2017. Association for Computing Machinery.
3. Hacker lexicon: what is the attribution problem?;Hay Newman,2016
4. M. Pannu, B. Gill, R. Bird, K. Yang, and B. Farrel. Exploring proxy detection methodology. In 2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF), pages 1–6, June 2016.
5. React: Facebook’s functional turn on writing javascript;Staff;Commun. ACM,2016
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献