搜索资源列表
Cybersecurity Strategy Implementation2
- The Intrusion Kill Chain fr a mework is based on Lockheed Martin's paper Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains
EKG-MonitorV1.0-SRC
- This mailing contains: (1) executable jar file: EKG-MonitorV1.0 (double click to start) (2) executable jar file: EKG-MonitorV1.0-SRC includes all sources and directories, using eclipse 3.2 (3) test data, 360 Hz samp