|
[1]
|
Cheng, Z.H., Beshley, M., Beshley, H., et al. (2020) Development of Deep Packet Inspection System for Network Traf-fic Analysis and Intrusion Detection. 2020 IEEE 15th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (TCSET), Lviv-Slavske, 25-29 February 2020, 877-881. [Google Scholar] [CrossRef]
|
|
[2]
|
Li, Z.Y., Xian, M., Liu, J., et al. (2020) The Development Trend of Artificial Intelligence in Cyberspace Security: A Brief Survey. Journal of Physics: Conference Series, 1486, Ar-ticle ID: 022047. [Google Scholar] [CrossRef]
|
|
[3]
|
Ahn, S., Paek, Y., et al. (2020) Hawkware: Network Intru-sion Detection Based on Behavior Analysis with ANNs on an IoT Device. 2020 57th ACM/IEEE Design Automation Conference (DAC). San Francisco, 20-24 July 2020, 1-6. [Google Scholar] [CrossRef]
|
|
[4]
|
Huang, X., Ma, L., Yang, W.Y., et al. (2020) A Method for Windows Malware Detection Based on Deep Learning. Journal of Signal Processing Systems, 93, 1-9.
|
|
[5]
|
Das, S. (2019) Taking Cyber Security to the Next Level. Dataquest, 37, 44-45.
|
|
[6]
|
Common Vulnerabilities and Exposures (CVE). The MITRE Corporation (2011) http://cve.mitre.org
|
|
[7]
|
Mell, P.M. and Scarfone, K. (2010) The Common Configuration Scoring System (CCSS): Metrics for Software Security Configuration Vulnerabilities. NIST Interagen-cy/Internal Report, Report No. 7502.
|
|
[8]
|
Gao, C.D., Guo, Q.Q., Jiang, D., et al. (2019) The Theoretical Basis and Technical Path of Cyberspace Geography. Journal of Geographical Sciences, 29, 1949-1964. [Google Scholar] [CrossRef]
|
|
[9]
|
Husari, G., Al-Shaer, E., Chu, B., et al. (2019) Learning APT Chains from Cyber Threat Intelligence. Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Secu-rity, Article No. 19, 1-2. [Google Scholar] [CrossRef]
|