[1] COVAULT C. Cyber threat challenges intelligence capability[J]. Aviation week & space technology, 1997, 146(6):20-21.
[2] KORZYK A D. Developing intelligence-based threat definitions for global information security management[C]//KHOSROWPOUR M. International conference of the Information-Resources-Management-Association.USA:IDEAGROUP,2003:862-864.
[3] 刘叶婷,唐斯斯.大数据对政府治理的影响及挑战[J].电子政务,2014,138(6):20-29.
[4] NTT. 2014 global threat intelligence report[EB/OL].[2015-10-10]. https://nttgroupsecurity.com.
[5] 爱微帮.[科技评论]从"2015年美国RSA大会"看网络安全技术发展趋势[EB/OL].[2015-10-12]. http://www.aiweibang.com/yuedu/29137570.html.
[6] 中国科技网. 美建网络威胁情报整合中心[EB/OL].[2015-10-12]. http://www.wokeji.com/jbsj/seb/201502/t20150217_973459.shtml.
[7] GARTNER. 中国IT安全硬件、软件和服务2015-2019全景图[EB/OL].[2015-10-12].http://www.idc.com/getdoc.jsp?containerId=CH251005.
[8] 齐鲁晚报. 2015黑帽大会人工智能新突破引全球黑客"关心"[EB/OL].[2015-10-13]. http://news.sina.com.cn/o/2015-06-19/155531970205.shtml?cre=newspagepc&mod=f&loc=8&r=a&rfunc=2.
[9] MILES C, LAKHOTIA A, LEDOUX C, et al. VirusBattle:State-of-the-art malware analysis for better cyber threat intelligence[C]//20147th international symposium on resilient control systems(ISRCS),New York:IEEE,2014:1-6.
[10] CAGLAYAN A, TOOTHAKER M, DRAPEAU D, et al. Behavioral analysis of botnets for threat intelligence[J]. Information systems and e-business management, 2012, 10(4):1-29.
[11] NAZAROV A. Botnets tracking and global threat intelligence-Behavioral approaches to identifying distributed botnets[C]//2012 Third Worldwide Cybersecurity Summit (WCS), New York:IEEE, 2012:1-5.
[12] 欧道兵, 刘永生, 干代武. 应对多种安全威胁情报信息工作的"两个着力点"[J]. 国防, 2013(3):34.
[13] 王卓君. 一种用于情报威胁评估的数据分类算法研究[J]. 情报杂志, 2011, 30(10):156-162.
[14] 董青. 基于威胁情报信息的民航空防安全预警方法研究[D].广汉:中国民用航空飞行学院, 2012.
[15] Gartner. Definition:threat intelligence[EB/OL].[2015-10-08]. https://www.gartner.com/doc/2487216/definition-threat-intelligence.
[16] Cybersecurity ventures. Cybersecurity Market Report Q32015[EB/OL].[2015-10-01]. http://cybersecurityventures.com/cybersecurity-market-report.
[17] 安全牛. 威胁情报不是知识产权[EB/OL].[2015-10-11]. http://www.aqniu.com/neo-points/10726.html.
[18] 网界网. 威胁情报共享:是安全突破,还是昙花一现?[EB/OL].[2015-10-11]. http://netsecurity.51cto.com/art/201506/481453.htm. |