1. Daly, M.K.: Advanced persistent threat. Usenix 4(4), 2013–2016 (2009)
2. Lake, J.: What is an advanced persistent threat (APT), with examples [Online] (2022). https://www.comparitech.com/blog/information-security/advanced-persistent-threat/. Last accessed May
3. Kaspersky. Advanced Persistent Threats in 2020: abuse of personal information and more sophisticated attacks are coming [Online]. https://www.kaspersky.com/about/press-releases/2019_advanced-persistent-threats-in-2020-abuse-of-personal-informationand-more-sophisticated-attacks-are-coming. Last accessed May 2022
4. Smiliotopoulos, C., Barmpatsalou, K., Kambourakis, G.: Revisiting the detection of lateral movement through Sysmon. Appl. Sci. 12(15), 7746 (2022)
5. Berady, A., Jaume, M., Tong, V.V.T., Guette, G.: From TTP to IoC: advanced persistent graphs for threat hunting. IEEE Trans. Netw. Serv. Manage. 18(2), 1321–1333 (2021)