Research on University’s Cyber Threat Intelligence Sharing Platform Based on New Types of STIX and T

来源 :信息安全(英文) | 被引量 : 0次 | 上传用户:wearetgd1
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
With the systematization of cyber threats, the variety of intrusion tools and intrusion methods has greatly reduced the cost of attackers’ threats to network security. Due to a large number of colleges and universities, teachers and students are highly ed
其他文献
闽甜208系福建农科院作物研究所与福建省种子总站合作的超甜玉米新品种。为满足近年来消费水平的逐步提高,本文对闽甜208进行无公害生产技术研究。
目的建立排石口服液的质量标准。方法采用薄层色谱法鉴别排石口服液中的赤芍、白芍、金钱草。结果薄层色谱中,供试品与对照品或对照药材色谱相应的位置上,显相同颜色的斑点,
目的观察替硝唑局部用药治疗孕妇急性冠周炎的临床疗效。方法选取孕妇患急性智齿冠周炎的病例共100例。随机分为两组。实验组在冠周龈盲袋内置替硝唑;对照组用复方碘甘油在冠
目的探讨糖尿病患者并发医院感染的特点,从而有效预防和控制糖尿病患者发生医院惑染。方法对本院2003年7月-2008年6月间糖尿病患者的出院病历进行医院感染及其病原学辱回顾性
IT risks—risks associated with the operation or use of information technology—have taken on great importance in business, and IT risk management is accordingl
This research attempts the implementation of an improved smartphone application for remote system administration. The work was motivated by the inability of net
In this paper, two Evolutionary Algorithms (EAs) i.e., an improved Genetic Algorithms (GAs) and Population Based Incremental Learning (PBIL) algorithm are appli
Cryptography and Steganography are two prominent techniques to obtain secure communication over the shared media like the Internet. Steganography is slightly ah
This article explores four critical groups of systematic risk embedded in smart contract employment using the analytic hierarchy process (AHP). The four princip
针对复杂地形环境下的Ad-hoc网络应用系统,比如以Ad-hoc网络为基础架构的智能交通定位系统,提出了一种新的Ad-hoc网络定位方案。该方案采用到达时间(TOA)测量值作为距离测量值