Tracing Advanced Persistent Threats in Networked Systems
暂无分享,去创建一个
We herein discuss the modeling of target information systems as well as various attacks, in order to clarify the impact of Advanced Persistent Threats (APTs) and to enable efficient planning of defense strategies to counter APTs.
[1] Eiji Okamoto,et al. Extraction of Parameters from Well Managed Networked System in Access Control , 2009, 2009 Fourth International Conference on Internet Monitoring and Protection.