A Study on Advanced Persistent Threats
暂无分享,去创建一个
Ping Chen | Lieven Desmet | Christophe Huygens | C. Huygens | Ping Chen | Lieven Desmet | Christophe Huygens
[1] George L Stefanek. Anatomy of an attack , 2002 .
[2] Frank Hill,et al. Protecting data from malicious software , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[3] J. Initiative. SP 800-39. Managing Information Security Risk: Organization, Mission, and Information System View , 2011 .
[4] Gordon Thomson. APTs: a poorly understood challenge , 2011, Netw. Secur..
[5] Colin Tankard,et al. Advanced Persistent threats and how to monitor and deter them , 2011, Netw. Secur..
[6] Wei Wang,et al. Using Large Scale Distributed Computing to Unveil Advanced Persistent Threats , 2012 .
[7] Leyla Bilge,et al. Industrial Espionage and Targeted Attacks: Understanding the Characteristics of an Escalating Threat , 2012, RAID.
[8] Yi-Ming Chen,et al. A Novel Search Engine to Uncover Potential Victims for APT Investigations , 2013, NPC.
[9] C. Roper. China: The Red Dragon of Economic Espionage , 2013 .
[10] Marc Dacier,et al. Research in Attacks, Intrusions and Defenses , 2014, Lecture Notes in Computer Science.
[11] Wouter Joosen,et al. Evolutionary algorithms for classification of malware families through different network behaviors , 2014, GECCO.