共 50 条
- [1] Network Forensics Attack-Analysis Model Based on Similarity of Intention [J]. 2011 INTERNATIONAL CONFERENCE ON COMPUTER APPLICATION AND EDUCATION TECHNOLOGY (ICCAET 2011), 2011, : 110 - 113
- [2] Improving Analysis Phase in Network Forensics By Using Attack Intention Analysis [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (05): : 297 - 307
- [3] A MODEL FOR NFAA-NETWORK FORENSICS ATTACK ANALYSIS [J]. THIRD INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY (ICCET 2011), 2011, : 739 - 746
- [4] Network intrusion intention analysis model based on Bayesian attack graph [J]. Tongxin Xuebao/Journal on Communications, 2020, 41 (09): : 160 - 169
- [6] Network Forensics Investigation for Botnet Attack [J]. IT CONVERGENCE AND SECURITY 2017, VOL 2, 2018, 450 : 228 - 236
- [8] Analysis of Cyber Attack Traceback Techniques from the Perspective of Network Forensics [J]. Ruan Jian Xue Bao/Journal of Software, 2021, 32 (01): : 194 - 217
- [9] Reconstruction of Potential Attack Scenarios of the OpenID Protocol Towards Network Forensics Analysis [J]. APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, ATIS 2015, 2015, 557 : 101 - 113