共 56 条
[1]
ATTRIBUTION OF MALICIOUS CYBER INCIDENTS: FROM SOUP TO NUTS[J] . Herbert Lin.  Journal of International Affairs . 2016 (1)
[2]
ATTRIBUTION OF MALICIOUS CYBER INCIDENTS: FROM SOUP TO NUTS[J] . Herbert Lin.  Journal of International Affairs . 2016 (1)
[3]
2018 aspen cyber summit:"five eyes" threat briefing. The Aspen Institute. https://www.aspeninstitute.org/events/2018-aspen-cyber-summit/ . 2019
[4]
2018 aspen cyber summit:"five eyes" threat briefing. The Aspen Institute. https://www.aspeninstitute.org/events/2018-aspen-cyber-summit/ . 2019
[5]
Talk about the importance of the five eyes in an era of global insecurity. Policy Exchange. https://policyexchange.org.uk/pxevents/the-importance-of-the-five-eyes-in-an-era-of-global-insecurity/ . 2019
[6]
Talk about the importance of the five eyes in an era of global insecurity. Policy Exchange. https://policyexchange.org.uk/pxevents/the-importance-of-the-five-eyes-in-an-era-of-global-insecurity/ . 2019
[7]
Soviet block report files. GCHQ. https://www.nationalarchives.gov.uk/documents/ukusa-highlights-guide.pdf . 2020
[8]
Soviet block report files. GCHQ. https://www.nationalarchives.gov.uk/documents/ukusa-highlights-guide.pdf . 2020
[9]
Cyber Operations and the 2009 Defence White Paper[J] .  Security Challenges . 2009 (4)
[10]
Cyber Operations and the 2009 Defence White Paper[J] .  Security Challenges . 2009 (4)

