C2-Eye: framework for detecting command and control (C2) connection of supply chain attacks
Author:
Publisher
Springer Science and Business Media LLC
Link
https://link.springer.com/content/pdf/10.1007/s10207-024-00850-y.pdf
Reference65 articles.
1. Miller, J.F.: Supply chain attack framework and attack patterns. The MITRE Corporation, MacLean (2013)
2. Ohm, M., Plate, H., Sykosch, A., Meier, M.: Backstabber’s knife collection: a review of open source software supply chain attacks. In: Detection of Intrusions and Malware, and Vulnerability Assessment: 17th International Conference, DIMVA 2020, Lisbon, Portugal, June 24–26, 2020, Proceedings 17, pp. 23–43. Springer (2020)
3. Datta, P.: Hannibal at the gates: cyberwarfare & the solarwinds sunburst hack. J. Inf. Technol. Teach. Cases 12(2), 115–120 (2022). https://doi.org/10.1177/2043886921993126
4. Verizon: Verizon data breach investigations report. Tech. rep., Verizon (2019)
5. Mirza, S., Abbas, H., Shahid, W.B., Shafqat, N., Fugini, M., Iqbal, Z., Muhammad, Z.: A malware evasion technique for auditing android anti-malware solutions. In: 2021 IEEE 30th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), pp. 125–130. IEEE (2021)
1.学者识别学者识别
2.学术分析学术分析
3.人才评估人才评估
"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370
www.globalauthorid.com
TOP
Copyright © 2019-2024 北京同舟云网络信息技术有限公司 京公网安备11010802033243号 京ICP备18003416号-3