入侵分析钻石模型学习笔记
来源:岁月联盟
时间:2020-03-16
Eric M. Hutchins, Michael J. Cloppert, and Rohan M. Amin. Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. In L. Armistad, editor, International Conference on Information Warfare and Security, volume 6, pages 113–125. Academic Conferences International, Academic Publishing International Unlimited, 2011. (洛克西马丁公司,Kill-Chain原始论文)
US Department of Defense. Joint Tactics, Techniques, and Procedures for Joint Intelligence Preparation of the Operational Environment (JP 2-01.3), June 2009. (美国国防部,作战环境联合情报准备)
A structured language for cyber threat intelligence information (STIX). [ONLINE] http://stix.mitre.org. (MITRE,STIX)
上一页 [1] [2] [3] [4] [5] [6] [7] [8]