[{"title":"( 52 个子文件 29.27MB ) 毕业设计反病毒虚拟机源码-graduation-project:设计","children":[{"title":"graduation-project-main","children":[{"title":"images","children":[{"title":"dve-1-result.png <span style='color:#111;'> 67.10KB </span>","children":null,"spread":false},{"title":"docker-network-mapping.png <span style='color:#111;'> 134.06KB </span>","children":null,"spread":false},{"title":"dve-1-ok.png <span style='color:#111;'> 52.46KB </span>","children":null,"spread":false},{"title":"taxii_diagram.png <span style='color:#111;'> 70.98KB </span>","children":null,"spread":false},{"title":"dve-3-ok.png <span style='color:#111;'> 271.31KB </span>","children":null,"spread":false},{"title":"attack-points.svg <span style='color:#111;'> 118.87KB </span>","children":null,"spread":false},{"title":"network-layers.png <span style='color:#111;'> 119.64KB </span>","children":null,"spread":false},{"title":"network-test-1.png <span style='color:#111;'> 81.65KB </span>","children":null,"spread":false},{"title":"SDN-realization.png <span style='color:#111;'> 31.11KB </span>","children":null,"spread":false},{"title":"THE-CYBER-KILL-CHAIN-body.png <span style='color:#111;'> 1.29MB </span>","children":null,"spread":false},{"title":"network-test-3.png <span style='color:#111;'> 129.16KB </span>","children":null,"spread":false},{"title":"taxii-models.png <span style='color:#111;'> 188.20KB </span>","children":null,"spread":false},{"title":"attack-route.png <span style='color:#111;'> 128.61KB </span>","children":null,"spread":false},{"title":"openstack-map.svg <span style='color:#111;'> 196.42KB </span>","children":null,"spread":false},{"title":"dve-2-ok.png <span style='color:#111;'> 119.74KB </span>","children":null,"spread":false},{"title":"CVEs.jpg <span style='color:#111;'> 74.80KB </span>","children":null,"spread":false},{"title":"malware-analysis.png <span style='color:#111;'> 319.83KB </span>","children":null,"spread":false},{"title":"001.png <span style='color:#111;'> 29.88KB </span>","children":null,"spread":false},{"title":"veth-pair.png <span style='color:#111;'> 122.19KB </span>","children":null,"spread":false},{"title":"opendaylight.jpg <span style='color:#111;'> 113.81KB </span>","children":null,"spread":false},{"title":"autoattack-function.png <span style='color:#111;'> 162.35KB </span>","children":null,"spread":false},{"title":"004.png <span style='color:#111;'> 345.40KB </span>","children":null,"spread":false},{"title":"ovn-architecture.png <span style='color:#111;'> 100.43KB </span>","children":null,"spread":false},{"title":"emulation.png <span style='color:#111;'> 408.40KB </span>","children":null,"spread":false},{"title":"dve-4-ok.png <span style='color:#111;'> 516.07KB </span>","children":null,"spread":false},{"title":"network-test-2.png <span style='color:#111;'> 181.67KB </span>","children":null,"spread":false},{"title":"ids-result.png <span style='color:#111;'> 332.14KB </span>","children":null,"spread":false},{"title":"ATT&CKMatrixforEnterprise.png <span style='color:#111;'> 483.09KB </span>","children":null,"spread":false},{"title":"python-result.png <span style='color:#111;'> 60.78KB </span>","children":null,"spread":false},{"title":"veth-connection.png <span style='color:#111;'> 37.33KB </span>","children":null,"spread":false},{"title":"attack-process.png <span style='color:#111;'> 154.82KB </span>","children":null,"spread":false},{"title":"CybOX-framwork.png <span style='color:#111;'> 14.36KB </span>","children":null,"spread":false},{"title":"range-environment.png <span style='color:#111;'> 121.97KB </span>","children":null,"spread":false},{"title":"github-ids.png <span style='color:#111;'> 211.29KB </span>","children":null,"spread":false},{"title":"dve-4-result.png <span style='color:#111;'> 22.23KB </span>","children":null,"spread":false},{"title":"1-1.jpg <span style='color:#111;'> 254.84KB </span>","children":null,"spread":false},{"title":"1-2.png <span style='color:#111;'> 138.73KB </span>","children":null,"spread":false},{"title":"network-support.png <span style='color:#111;'> 60.81KB </span>","children":null,"spread":false},{"title":"003.png <span style='color:#111;'> 582.26KB </span>","children":null,"spread":false},{"title":"network-result.png <span style='color:#111;'> 26.86KB </span>","children":null,"spread":false},{"title":"openvswitch-openflow.png <span style='color:#111;'> 55.52KB </span>","children":null,"spread":false},{"title":"dve-2-result.png <span style='color:#111;'> 126.62KB </span>","children":null,"spread":false},{"title":"002.png <span style='color:#111;'> 19.18KB </span>","children":null,"spread":false},{"title":"dve--3-result.png <span style='color:#111;'> 172.99KB </span>","children":null,"spread":false},{"title":"APT3-Emulation-Plan.png <span style='color:#111;'> 445.96KB </span>","children":null,"spread":false}],"spread":false},{"title":"output","children":[{"title":"images","children":[{"title":"ATT&CKMatrixforEnterprise.png <span style='color:#111;'> 483.09KB </span>","children":null,"spread":false},{"title":"Adversary-emulation-in-the-cyber-kill-chain.png <span style='color:#111;'> 35.90KB </span>","children":null,"spread":false},{"title":"APT3.png <span style='color:#111;'> 128.70KB </span>","children":null,"spread":false}],"spread":true},{"title":"graduation-paper.md <span style='color:#111;'> 7.95KB </span>","children":null,"spread":false}],"spread":true},{"title":"videos","children":[{"title":"中期答辩演示视频.mp4 <span style='color:#111;'> 20.62MB </span>","children":null,"spread":false}],"spread":true},{"title":"README.md <span style='color:#111;'> 74.39KB </span>","children":null,"spread":false},{"title":"references","children":[{"title":"uws-using-mitre-attack-in-threat-hunting-and-detection-white-paper.pdf <span style='color:#111;'> 1.91MB </span>","children":null,"spread":false}],"spread":true}],"spread":true}],"spread":true}]