Advanced persistent threat organization identification based on software gene of malware
暂无分享,去创建一个
Zhihong Tian | Hui Lu | Yanbin Sun | Man Zhang | Wenxiang Chen | Xiaohan Helu | Chengjie Jin | Zhihong Tian | Hui Lu | Yanbin Sun | Chengjie Jin | Xiaohan Helu | Wenxiang Chen | Man Zhang
[1] Mohamed Hamdi,et al. Game-based adaptive security in the Internet of Things for eHealth , 2014, 2014 IEEE International Conference on Communications (ICC).
[2] Shen Su,et al. Real-Time Lateral Movement Detection Based on Evidence Reasoning Network for Edge Computing Environment , 2019, IEEE Transactions on Industrial Informatics.
[3] H. Vincent Poor,et al. Incorporating Attack-Type Uncertainty Into Network Protection , 2014, IEEE Transactions on Information Forensics and Security.
[4] Ness B. Shroff,et al. Security Game with Non-additive Utilities and Multiple Attacker Resources , 2017, SIGMETRICS.
[5] Mohsen Guizani,et al. Vcash: A Novel Reputation Framework for Identifying Denial of Traffic Service in Internet of Connected Vehicles , 2019, IEEE Internet of Things Journal.
[6] Tansu Alpcan,et al. Security Games with Incomplete Information , 2009, 2009 IEEE International Conference on Communications.
[7] Yun Chen,et al. Dynamic defense strategy against advanced persistent threat under heterogeneous networks , 2019, Inf. Fusion.
[8] Xiaojiang Du,et al. A Distributed Deep Learning System for Web Attack Detection on Edge Devices , 2020, IEEE Transactions on Industrial Informatics.
[9] Song Guo,et al. Secure Multimedia Big Data in Trust-Assisted Sensor-Cloud for Smart City , 2017, IEEE Communications Magazine.
[10] Kevin C. Desouza,et al. Strategically-motivated advanced persistent threat: Definition, process, tactics and a disinformation model of counterattack , 2019, Comput. Secur..
[11] Victor C. M. Leung,et al. Social Sensor Cloud: Framework, Greenness, Issues, and Outlook , 2018, IEEE Network.
[12] Zhenkai Liang,et al. Polyglot: automatic extraction of protocol message format using dynamic binary analysis , 2007, CCS '07.
[13] Vyas Sekar,et al. An empirical evaluation of entropy-based traffic anomaly detection , 2008, IMC '08.
[14] Elisa Bertino,et al. Interdependent Security Risk Analysis of Hosts and Flows , 2015, IEEE Transactions on Information Forensics and Security.
[15] Victor C. M. Leung,et al. Multi-Method Data Delivery for Green Sensor-Cloud , 2017, IEEE Communications Magazine.
[16] Ling Huang,et al. Stealthy poisoning attacks on PCA-based anomaly detectors , 2009, SIGMETRICS Perform. Evaluation Rev..
[17] SkopikFlorian,et al. Combating advanced persistent threats , 2015 .
[18] Xiaoying Gan,et al. An Intelligence-Driven Security-Aware Defense Mechanism for Advanced Persistent Threats , 2019, IEEE Transactions on Information Forensics and Security.
[19] Zhen Xu,et al. ConnSpoiler: Disrupting C&C Communication of IoT-Based Botnet Through Fast Detection of Anomalous Domain Queries , 2020, IEEE Transactions on Industrial Informatics.
[20] Christopher Krügel,et al. Limits of Static Analysis for Malware Detection , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[21] Dongwen Zhang,et al. Nei-TTE: Intelligent Traffic Time Estimation Based on Fine-Grained Time Derivation of Road Segments for Smart City , 2020, IEEE Transactions on Industrial Informatics.
[22] Ali A. Ghorbani,et al. Automated malware classification based on network behavior , 2013, 2013 International Conference on Computing, Networking and Communications (ICNC).
[23] Indrajit Ray,et al. Dynamic Security Risk Management Using Bayesian Attack Graphs , 2012, IEEE Transactions on Dependable and Secure Computing.
[24] Florian Skopik,et al. Combating advanced persistent threats: From network event correlation to incident detection , 2015, Comput. Secur..
[25] Victor C. M. Leung,et al. Towards Pricing for Sensor-Cloud , 2020, IEEE Transactions on Cloud Computing.