共 18 条
[1]
道路真理生命. .
[2]
Cybersecurity:From months to milliseconds. Fonash P,Schneck P. Computer . 2015
[3]
Strengthening the cyber ecosystem[Z/OL]. Peter M.Fonash. https://resources.sei.cmu.edu/assetfiles/Presentation/2016 017001473601.pdf . 2016
[5]
https://www.rsaconference.com/events/us15/downloads-andmedia?keyw ords=.&.track=.&.type=presentations .
[6]
Your first look into trends and topics at the 2015 RSA conference[Z/OL]. Ashley. https://w w w.tracesecurity.com/blog/your-first-look-into-trends-andtopics-at-the-2015-rsa-conference-rsac . 2014
[7]
Cyber threat intelligence services[Z/OL]. Fire Eye. https://www.fireeye.com/content/dam/fireeye-w w w/services/pdfs/pf/intel/ds-cti-services.pdf . 2017
[8]
Department of defense strategy for operating in cyberspace. U.S.Department of Defense. http://csrc.nist.gov/groups/SMA/ispab/documents/DOD-Strategy-for-Operating-in-Cyberspace.pdf . 2011
[9]
Agency partners with Anomali to share threat intelligence used to protect 5.3 million residents[Z/OL]. ANOMALI. https://w w w.anomali.com/new s-events/press/cook-county-dhs-and-emergency-management-launchcyber-threat-intelligence-g . 2016
[10]
中华人民共和国森林法. . 1998