Modeling the Operational Phases of APT Campaigns
暂无分享,去创建一个
Christophe Bidan | Gilles Guette | Aimad Berady | Valerie Viet Triem Tong | Guillaume Carat | C. Bidan | Gilles Guette | Aimad Berady | Valérie Viet Triem Tong | Guillaume Carat
[1] Mica R. Endsley,et al. Toward a Theory of Situation Awareness in Dynamic Systems , 1995, Hum. Factors.
[2] J. A. Battaglia,et al. Finding Cyber Threats with ATT&CK-Based Analytics , 2017 .
[3] S. Radack. Managing Information Security Risk: Organization, Mission, and Information System View | NIST , 2011 .
[4] Eric Michael Hutchins,et al. Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains , 2010 .
[5] George Rajna,et al. Equifax Data Breach , 2018 .
[6] R. Ross. Managing Information Security Risk: Organization, Mission, and Information System View | NIST , 2011 .
[7] Scott D. Lathrop,et al. Towards a definition of cyberspace tactics, techniques and procedures , 2017, 2017 IEEE International Conference on Big Data (Big Data).