Author:
He Yuan,Xing Changyou,Ding Ke,Zhang Guomin,Song Lihua
Funder
National Natural Science Foundation of China
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Software
Reference28 articles.
1. A novel kill-chain framework for remote security log analysis with SIEM software;Bryant;Comput Secur,2017
2. ATT&CK. Available in https://attack.mitre.org/.
3. A game-theoretic analysis to defend against remote operating system fingerprinting;Rahman;J Inform Secur Applic,2020
4. A differentially private game theoretic approach for deceiving cyber adversaries;Ye;IEEE Trans Inf Forensics Secur,2020
5. A machine-learning-based tool for passive OS fingerprinting with TCP variant as a novel feature;Hagos;IEEE Internet of Thing J,2020
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Research on Multi-stage Proactive Defense Strategy against Intelligent Penetration Attacks;2023 IEEE 6th International Conference on Automation, Electronics and Electrical Engineering (AUTEEE);2023-12-15