Sherlock Holmes and the Case of the Advanced Persistent Threat
暂无分享,去创建一个
Ari Juels | Ting-Fang Yen | A. Juels | T. Yen
[1] Susan Young,et al. Anatomy of an Attack , 2003 .
[2] Sebastian Zander,et al. A survey of covert channels and countermeasures in computer network protocols , 2007, IEEE Communications Surveys & Tutorials.
[3] Tyrell William Fawcett. EXFILD: A TOOL FOR THE DETECTION OF DATA EXFILTRATION USING ENTROPY AND ENCRYPTION CHARACTERISTICS OF NETWORK TRAFFIC , 2010 .
[4] W. Marsden. I and J , 2012 .
[5] Peter P. Swire. A Model for When Disclosure Helps Security: What Is Different About Computer and Network Security? , 2004, J. Telecommun. High Technol. Law.
[6] Calton Pu,et al. Reverse Social Engineering Attacks in Online Social Networks , 2011, DIMVA.
[7] J. René van Dorp,et al. Detecting Targeted Malicious Email Using Persistent Threat and Recipient Oriented Features , 2010 .
[8] Christopher Krügel,et al. Your botnet is my botnet: analysis of a botnet takeover , 2009, CCS.
[9] George L Stefanek. Anatomy of an attack , 2002 .
[10] Craig H. Rowland,et al. Covert Channels in the TCP/IP Protocol Suite , 1997, First Monday.
[11] Ketan Mayer-Patel,et al. Summary-Invisible Networking: Techniques and Defenses , 2010, ISC.
[12] Sreenivasa Rao Vadalasetty. Security Concerns in Using Open Source Software for Enterprise Requirements , 2009 .
[13] Stephan Katzenbeisser,et al. Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .
[14] Eric Michael Hutchins,et al. Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains , 2010 .
[15] Stefano Zanero,et al. Studying Bluetooth Malware Propagation: The BlueBag Project , 2007, IEEE Security & Privacy.
[16] Edwin Pickstone,et al. ILLEGITIMI NON CARBORUNDUM , 2012 .