[1] |
MITRE. Enterprise Matrix (2023)[EB/OL].[2023-04-06]. https://attack.mitre.org/matrices/enterprise.
|
[2] |
王平, 汪定, 黄欣沂. 口令安全研究进展[J]. 计算机研究与发展, 2016, 53(10):2173-2188.
|
|
WANG Ping, WANG Ding, HUANG Xinyi. Advances in Password Security[J]. Journal of Computer Research and Development, 2016, 53(10):2173-2188.
|
[3] |
DING X, LIU B, JIANG Z, et al. Spear Phishing Emails Detection Based on Machine Learning[C]// 2021 IEEE 24th International Conference on Computer Supported Cooperative Work in Design(CSCWD).Piscataway:IEEE, 2021:354-359.
|
[4] |
STRINGHINI G, THONNARD O. That Ain’t You:Blocking Spearphishing Through Behavioral Modelling[C]// International Conference on Detection of Intrusions and Malware,and Vulnerability Assessment.Berlin:Springer, 2015:78-97.
|
[5] |
GASCON H, ULLRICH S, STRITTERB, et al. Reading Betweenthe Lines:Content-Agnostic Detection of Spear-Phishing Emails[C]// International Symposium on Research in Attacks,Intrusions,and Defenses.Berlin:Springer, 2018:69-91.
|
[6] |
WANG X J, ZHANG C X, ZHENG K F, et al. Detecting Spear-Phishing Emails Based on Authentication[C]// 2019 IEEE 4th International Conference on Computer and Communication Systems(ICCCS).Piscataway:IEEE, 2019:450-456.
|
[7] |
HU X, LI B, ZHANG Y, et al. Detecting Compromised Email Accountsfrom the Perspective of Graph Topology[C]// Proceedings of the 11th International Conference on Future Internet Technologies. New York: ACM, 2016:76-82.
|
[8] |
HO G, SHARMA A, JAVED M, et al. Detecting Credential Spearphishing in Enterprise Settings[C]// 26th USENIX Security Symposium (USENIX Security 17).Berkeley:USENIX, 2017:469-485.
|
[9] |
杨加, 李笑难, 张扬, 等. 基于大数据分析的校园电子邮件异常行为检测技术研究[J]. 通信学报, 2018, 39(Z1):116-123.
|
|
YANG Jia, LI Xiaonan, ZHANG Yang, et al. Abnormal Behavior Detection for Campus Email Systems Based on Big Data Analysis[J]. Journal on Communications, 2018, 39(Z1):116-123.
|
[10] |
HO G, CIDON A, GAVISH L, et al. Detecting and Characterizing Lateral Phishing at Scale[C]// 28th USENIX Security Symposium (USENIX Security 19).Berkeley:USENIX, 2019:1273-1290.
|
[11] |
VISWANATH B, BASHIR M A, CROVELLA M, et al. Towards Detecting Anomalous User Behavior in Online Social Networks[C]// 23rd USENIX security symposium (USENIX security 14).Berkeley:USENIX, 2014:223-238.
|
[12] |
XIN R, WU Z, WANG H, et al. Profiling Online Social Behaviors for Compromised Account Detection[J]. IEEE Transactions on Information Forensics and Security, 2015, 11(1):176-187.
doi: 10.1109/TIFS.2015.2482465
|
[13] |
EGELE M, STRINGHINI G, KRUEGEL C, et al. Towards Detecting Compromised Accounts on Social Networks[J]. IEEE Transactions on Dependable and Secure Computing, 2015, 14(4):447-460.
doi: 10.1109/TDSC.2015.2479616
|
[14] |
STRINGHINI G, MOURLANNE P, JACOB G, et al. {EVILCOHORT}:Detecting Communities of Malicious Accounts on Online Services[C]//24th USENIX Security Symposium (USENIX Security 15).Berkeley:USENIX, 2015:563-578.
|
[15] |
王丽娜, 柯剑鹏, 叶傲霜, 等. 基于多元特征的微博被劫持账户检测[J]. 武汉大学学报:理学版, 2020, 66(2):95-102.
|
|
WANG Lina, KE Jianpeng, YE Aoshuang, et al. Compromised Accounts Detection in Weibo Based on Multiple Features[J]. Journal of Wuhan University (Nature Science Edition), 2020, 66(2):95-102.
|
[16] |
住房和城乡建设部城市交通基础设施监测与治理实验室, 中国城市规划设计研究院, 百度地图. 2022年度中国主要城市通勤监测报告 (2022)[R/OL].[2022-07-29]. https://huiyan.baidu.com/reports/landing?id=123.
|
[17] |
BLONDEL V D, GUILLAUME J L, LAMBIOTTE R, et al. Fast Unfolding of Communities in Large Networks[J]. Journal of Statistical Mechanics:Theory and Experiment, 2008, 2008(10):P10008.
doi: 10.1088/1742-5468/2008/10/P10008
|
[18] |
KHAN K, REHMAN S U, AZIZ K, et al. DBSCAN:Past,Present and Future[C]// The fifth International Conference on the Applications of Digital Information and Web Technologies(ICADIWT 2014).Piscataway:IEEE, 2014:232-238.
|
[19] |
NUR A Y, TOZAL M E. Identifying Critical Autonomous Systems in the Internet[J]. The Journal of Supercomputing, 2018, 74(10):4965-4985.
doi: 10.1007/s11227-018-2336-3
|
[20] |
ALIENVAULT. Open Threat Exchange(2023)[EB/OL].[2023-04-06]. https://otx.alienvault.com/browse/global/pulses.
|