共 50 条
- [23] How to generate realistic network traffic? 2014 IEEE 38TH ANNUAL INTERNATIONAL COMPUTERS, SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2014, : 299 - 304
- [30] Decepticon: a Theoretical Framework to Counter Advanced Persistent Threats Information Systems Frontiers, 2021, 23 : 897 - 913