[1] |
WIDUP S, RUDIS B, HYLENDER D, et al. 2015Verizon Data Breach Investigations Report[EB/OL]. https://www.researchgate.net/publication/289254638_2015_Verizon_Data_Breach_Investigations_Report, 2017-5-11.
|
[2] |
王宏伟. 网络安全威胁与对策[J]. 科技创业月刊,2006,19(5):179-180.
|
[3] |
云晓春. 威胁情报助力互联网应急响应[J]. 信息安全与通信保密,2015(10):21-21.
|
[4] |
朱鹏飞,张利琴,李伟,等. 交互型电子签名的形式化分析[J]. 信息网络安全,2016(9):31-34.
|
[5] |
Mastercard. MasterCard Launches Solution to Protect Against Cyber Hacking of Banks and Processors[EB/OL]., 2017-5-11.
|
[6] |
Natalie Gagliordi. Visa and FireEye Bolster Security Partnership with New Threat Intelligence Service[EB/OL]. , 2015-10-13.
|
[7] |
姬炳帅,李虎,韩伟红,等. 面向电子商务的用户异常行为检测研究[J]. 信息网络安全,2014(9):80-85.
|
[8] |
DIETTERICH T G. Ensemble Methods in Machine Learning[EB/OL]. https://www.researchgate.net/publication/2631839_Lecture_Notes_in_Computer_Science, 2017-5-11.
|
[9] |
Cyren. IP Reputation[EB/OL]. , 2017-5-11.
|
[10] |
文伟平,郭荣华,孟正,等. 信息安全风险评估关键技术研究与实现[J]. 信息网络安全,2015(2):7-14.
|
[11] |
KIMBALL R, CASERTA J.The Data Warehouse ETL Toolkit: Practical Techniques for Extracting, Cleaning, Conforming, and Delivering Data[M]. New Jersey: John Wiley & Sons, 2011.
|
[12] |
陈碧秀,江汉祥,林志宏,等. 案件电子数据云平台建设的研究及探讨[J]. 信息网络安全,2016(9):154-157.
|