Targeted Cyberattacks: A Superset of Advanced Persistent Threats
暂无分享,去创建一个
[1] Christopher Krügel,et al. Detection and analysis of drive-by-download attacks and malicious JavaScript code , 2010, WWW '10.
[2] Anthony Lai,et al. Evidence of Advanced Persistent Threat: A case study of malware for political espionage , 2011, 2011 6th International Conference on Malicious and Unwanted Software.
[3] Angelos Stavrou,et al. Exploiting smart-phone USB connectivity for fun and profit , 2010, ACSAC '10.
[4] Aditya K Sood,et al. Browser user interface design flaws exploiting user ignorance , 2011 .
[5] J. Haines,et al. Achieving Cyber Survivability in a Contested Environment Using a Cyber Moving Target , 2011 .
[6] Nicolas Christin,et al. On Critical Infrastructure Protection and International Agreements , 2011 .
[7] G. O'Hara,et al. Cyber-Espionage: A Growing Threat to the American Economy , 2010 .
[8] Hamed Mohsenian Rad,et al. Distributed Internet-Based Load Altering Attacks Against Smart Power Grids , 2011, IEEE Transactions on Smart Grid.
[9] Engin Kirda,et al. A security analysis of Amazon's Elastic Compute Cloud service , 2012, IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012).
[10] Amr M. Youssef,et al. On the analysis of the Zeus botnet crimeware toolkit , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.