共 43 条
- [31] Seeing the Attack Paths: Improved Flow Correlation Scheme in Stepping-Stone Intrusion PROCEEDINGS OF THE 2024 27 TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, CSCWD 2024, 2024, : 2110 - 2115
- [33] A Framework to Test Resistency of Detection Algorithms for Stepping-Stone Intrusion on Time-Jittering Manipulation WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
- [34] Online Sketching of Network Flows for Real-Time Stepping-Stone Detection 25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, 2009, : 473 - 483
- [35] Detecting stepping-stone intrusion and resisting evasion through TCP/IP packets cross-matching AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2008, 5060 : 2 - 12
- [36] Using Dynamic Programming Techniques to Detect Multi-Hop Stepping-Stone Pairs in a Connection Chain 2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2010, : 198 - 205
- [39] Analyze University Network Traffic to Explore Usage Behaviour and to Detect Malicious Activities 2015 1ST INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2015, : 686 - 691