Advanced persistent threat organization identification based on software gene of malware

[1]  Mohamed Hamdi,et al.  Game-based adaptive security in the Internet of Things for eHealth , 2014, 2014 IEEE International Conference on Communications (ICC).

[2]  Shen Su,et al.  Real-Time Lateral Movement Detection Based on Evidence Reasoning Network for Edge Computing Environment , 2019, IEEE Transactions on Industrial Informatics.

[3]  H. Vincent Poor,et al.  Incorporating Attack-Type Uncertainty Into Network Protection , 2014, IEEE Transactions on Information Forensics and Security.

[4]  Ness B. Shroff,et al.  Security Game with Non-additive Utilities and Multiple Attacker Resources , 2017, SIGMETRICS.

[5]  Mohsen Guizani,et al.  Vcash: A Novel Reputation Framework for Identifying Denial of Traffic Service in Internet of Connected Vehicles , 2019, IEEE Internet of Things Journal.

[6]  Tansu Alpcan,et al.  Security Games with Incomplete Information , 2009, 2009 IEEE International Conference on Communications.

[7]  Yun Chen,et al.  Dynamic defense strategy against advanced persistent threat under heterogeneous networks , 2019, Inf. Fusion.

[8]  Xiaojiang Du,et al.  A Distributed Deep Learning System for Web Attack Detection on Edge Devices , 2020, IEEE Transactions on Industrial Informatics.

[9]  Song Guo,et al.  Secure Multimedia Big Data in Trust-Assisted Sensor-Cloud for Smart City , 2017, IEEE Communications Magazine.

[10]  Kevin C. Desouza,et al.  Strategically-motivated advanced persistent threat: Definition, process, tactics and a disinformation model of counterattack , 2019, Comput. Secur..

[11]  Victor C. M. Leung,et al.  Social Sensor Cloud: Framework, Greenness, Issues, and Outlook , 2018, IEEE Network.

[12]  Zhenkai Liang,et al.  Polyglot: automatic extraction of protocol message format using dynamic binary analysis , 2007, CCS '07.

[13]  Vyas Sekar,et al.  An empirical evaluation of entropy-based traffic anomaly detection , 2008, IMC '08.

[14]  Elisa Bertino,et al.  Interdependent Security Risk Analysis of Hosts and Flows , 2015, IEEE Transactions on Information Forensics and Security.

[15]  Victor C. M. Leung,et al.  Multi-Method Data Delivery for Green Sensor-Cloud , 2017, IEEE Communications Magazine.

[16]  Ling Huang,et al.  Stealthy poisoning attacks on PCA-based anomaly detectors , 2009, SIGMETRICS Perform. Evaluation Rev..

[17]  SkopikFlorian,et al.  Combating advanced persistent threats , 2015 .

[18]  Xiaoying Gan,et al.  An Intelligence-Driven Security-Aware Defense Mechanism for Advanced Persistent Threats , 2019, IEEE Transactions on Information Forensics and Security.

[19]  Zhen Xu,et al.  ConnSpoiler: Disrupting C&C Communication of IoT-Based Botnet Through Fast Detection of Anomalous Domain Queries , 2020, IEEE Transactions on Industrial Informatics.

[20]  Christopher Krügel,et al.  Limits of Static Analysis for Malware Detection , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).

[21]  Dongwen Zhang,et al.  Nei-TTE: Intelligent Traffic Time Estimation Based on Fine-Grained Time Derivation of Road Segments for Smart City , 2020, IEEE Transactions on Industrial Informatics.

[22]  Ali A. Ghorbani,et al.  Automated malware classification based on network behavior , 2013, 2013 International Conference on Computing, Networking and Communications (ICNC).

[23]  Indrajit Ray,et al.  Dynamic Security Risk Management Using Bayesian Attack Graphs , 2012, IEEE Transactions on Dependable and Secure Computing.

[24]  Florian Skopik,et al.  Combating advanced persistent threats: From network event correlation to incident detection , 2015, Comput. Secur..

[25]  Victor C. M. Leung,et al.  Towards Pricing for Sensor-Cloud , 2020, IEEE Transactions on Cloud Computing.