Publisher
Springer International Publishing
Reference13 articles.
1. Khosravi, M., Ladani, B.T.: Alerts correlation and causal analysis for APT based cyber attack detection. IEEE Access 8, 162642–162656 (2020). https://doi.org/10.1109/ACCESS.2020.3021499
2. Denning, D.E.: An intrusion-detection model. IEEE Trans. Softw. Eng., SE-13(2), 222–232 (1987)
3. Hu, Z., Odarchenko, R., Gnatyuk, S., Zaliskyi, M., Chaplits, A., Bondar, S., Borovik, V.: Statistical techniques for detecting cyberattacks on computer networks based on an analysis of abnormal traffic behavior. Int. J. Comput. Netw. Inf. Secur. 12(6), 1–13 (2020)
4. Qi, Y., Jiang, R., Jia, Y., Li, A.: An APT attack analysis framework based on self-define rules and mapreduce. In: 2020 IEEE Fifth International Conference on Data Science in Cyberspace (DSC), pp. 61–66 (2020). https://doi.org/10.1109/DSC50466.2020.00017
5. Liu, D., Zhang, H., Yu, H., Liu, X., Zhao, Y., Lv, G.: Research and application of APT attack defense and detection technology based on big data technology. In: 2019 IEEE 9th International Conference on Electronics Information and Emergency Communication (ICEIEC), pp. 1–4 (2019). https://doi.org/10.1109/ICEIEC.2019.8784483