[1]The Cooperative Association for Internet Data Analysis(CAIDA), http:www.caida.orgdata[EBOL]. [20100718]. 北京长亭未来科技. https:www.chaitin.cnzhcloudwalker[2]Xu Mingkun, Chen Xi, Hu Yan. Design of software to search ASP Web shell[J]. Procedia Engineering, 2012, 29: 123127[3]Hou Y T, Chang Y, Chen T, et al. Malicious Web content detection by machine learning[EBOL]. [20220810]. https:xueshu.baidu.comusercenterpapershow?paperid=22653a14af6928ba419c81a2fb449da0[4]Phillips C, Swiler L P. A graphbased system for networkvulnerability analysis[C] Proc of the 1998 Workshop on New Security Paradigms. 1998: 7179[5]迟占博, 张勖, 李婧, 等. 基于区块链的可信交易完备性模式设计[J]. 信息安全研究, 2022, 8(5): 460467[6]张勖, 鲁梦楠, 李婧, 等. 可信交易区块链实验平台关键问题研究[J]. 信息安全研究, 2022, 8(5): 437442[7]刘莉莉, 吕斌. 新形势下网络安全等级保护2.0体系建设探索与实践[J]. 信息安全研究, 2022, 8(2): 196199 |