Acceso abierto

Research on the traceability of attack teams based on offensive and defensive confrontation

, , , ,  y   
05 nov 2024

Cite
Descargar portada

He yi. Research and implementation of Trojan Horse hiding technology Based on P2P. Search in Google Scholar

Wang Gang. The traceability method in the network attack and defense. Search in Google Scholar

Gao Qigong Xiaojing Huang Rui Huang Chenglin Zhou Shenyong. The traceability method of network attack and trapping based on honeypot technology. Search in Google Scholar

Wang Hua Li Jue Li Bo Tan Haibo. Trability analysis of attack and defense drill. Search in Google Scholar