[1] |
CNCERT/CC. 2016中国移动互联网发展状况及其安全报告[R]. 2016.
|
|
CNCERT/CC. China mobile Internet development and security report[R]. 2016.
|
[2] |
孙增 . 高级持续性威胁(APT)的攻防技术研究[D]. 上海:上海交通大学, 2015.
|
|
SUN Z . The attack and defense technology research of advanced persistent threat[D]. Shanghai:Shanghai Jiao Tong University, 2015.
|
[3] |
TOUNSI W , RAIS H . A survey on technical threat intelligence in the age of sophisticated cyber attacks[J]. Computers & Security, 2018,72: 212-233.
|
[4] |
左晓栋 . 立法困局下的战略新部署:美国关键基础设施保护行政令述评[J]. 中国信息安全, 2013(3): 74-75.
|
|
ZUO X D . New strategic deployment in the legislative dilemma:a review of the U.S.executive order for critical infrastructure protection[J]. China Information Security, 2013(3): 74-75.
|
[5] |
赵艳玲 . 浅谈美国《提升关键基础设施网络安全框架》[J]. 信息安全与通信保密, 2015(5): 16-21.
|
|
ZHAO Y L . A brief talk on “framework for improving critical infrastructure cybersecurity”[J]. Information Security and Communications Privacy, 2015(5): 16-21.
|
[6] |
宋国涛 . 试析美国《网络安全信息共享法案》[J]. 保密科学技术, 2016(6): 28-31.
|
|
SONG G T . Analysis of the US cybersecurity information sharing act[J]. Secrecy Science and Technology, 2016(6): 28-31.
|
[7] |
NIST. SP800-150:guide to cyber threat information sharing[S]. 2014.
|
[8] |
王沁心, 杨望 . 基于 STIX 标准的威胁情报实体抽取研究[J]. 网络空间安全, 2020(8): 86-91.
|
|
WANG Q X , YANG W . Extraction of threat intelligence entities based on STIX[J]. Cyberspace Security, 2020(8): 86-91.
|
[9] |
CASEY E , BACK G , BARNUM S . Leveraging CybOX? to standardize representation and exchange of digital forensic information[J]. Digital Investigation, 2015,12: S102-S110.
|
[10] |
USSATH M , JAEGER D , CHENG F ,et al. Pushing the limits of cyber threat intelligence:extending STIX to support complex patterns[C]// Information Technology:New Generations.[S.l.:s.n.], 2016.
|
[11] |
FRANSEN F , SMULDERS A , KERKDIJK R . Cyber security information exchange to gain insight into the effects of cyber threats and incidents[J]. Elektrotechnik und Informationstechnik, 2015,132(2): 106-112.
|
[12] |
林玥, 刘鹏, 王鹤 ,等. 网络安全威胁情报共享与交换研究综述[J]. 计算机研究与发展, 2020,57(10): 2052-2065.
|
|
LIN Y , LIU P , WANG H ,et al. Overview of threat intelligence sharing and exchange in cybersecurity[J]. Journal of Computer Research and Development, 2020,57(10): 2052-2065.
|
[13] |
杨沛安, 武杨, 苏莉娅 ,等. 网络空间威胁情报共享技术综述[J]. 计算机科学, 2018,45(6): 9-18,26.
|
|
YANG P A , WU Y , SU L Y ,et al. Overview of threat intelligence sharing technologies in cyberspace[J]. Computer Science, 2018,45(6): 9-18,26.
|
[14] |
国家市场监督管理总局,国家标准化管理委员会. 信息安全技术 网络安全威胁信息格式规范:GB/T 36643—2018[S]. 2018.
|
|
State Administration for Market Regulation,Standardization Administration. Information security technology—cyber security threat information format:GB/T 36643—2018[S]. 2018.
|