Framework of Cyber Attack Attribution Based on Threat Intelligence.
Q. Li, Z. Yang, B. Liu, Z. Jiang, and J. Yan. InterIoT/SaSeIoT, volume 190 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 92-103. (2016)
Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/interiot/LiYLJY16
%A Li, Qiang
%A Yang, Zeming
%A Liu, Baoxu
%A Jiang, Zhengwei
%A Yan, Jian
%B InterIoT/SaSeIoT
%D 2016
%E Mitton, Nathalie
%E Chaouchi, Hakima
%E Noël, Thomas
%E Watteyne, Thomas
%E Gabillon, Alban
%E Capolsini, Patrick
%K dblp
%P 92-103
%T Framework of Cyber Attack Attribution Based on Threat Intelligence.
%U http://dblp.uni-trier.de/db/conf/interiot/interiot2016.html#LiYLJY16
%V 190
%@ 978-3-319-52726-0
@inproceedings{conf/interiot/LiYLJY16,
added-at = {2018-12-21T00:00:00.000+0100},
author = {Li, Qiang and Yang, Zeming and Liu, Baoxu and Jiang, Zhengwei and Yan, Jian},
biburl = {https://www.bibsonomy.org/bibtex/222c0b38fb5ae43e949f1c3bce50915da/dblp},
booktitle = {InterIoT/SaSeIoT},
crossref = {conf/interiot/2016},
editor = {Mitton, Nathalie and Chaouchi, Hakima and Noël, Thomas and Watteyne, Thomas and Gabillon, Alban and Capolsini, Patrick},
ee = {https://doi.org/10.1007/978-3-319-52727-7_11},
interhash = {4acb03093f2848abd5228f04352701b0},
intrahash = {22c0b38fb5ae43e949f1c3bce50915da},
isbn = {978-3-319-52726-0},
keywords = {dblp},
pages = {92-103},
series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering},
timestamp = {2018-12-22T11:39:00.000+0100},
title = {Framework of Cyber Attack Attribution Based on Threat Intelligence.},
url = {http://dblp.uni-trier.de/db/conf/interiot/interiot2016.html#LiYLJY16},
volume = 190,
year = 2016
}