Author:
Silomon Jantje A. M.,Roeling Mark Patrick
Publisher
Springer Berlin Heidelberg
Reference32 articles.
1. Agrafiotis, I., Nurse, J.R.C., Buckley, O., Legg, P.A., Creese, S., Goldsmith, M.: Identifying attack patterns for insider threat detection. Comput. Fraud Secur. 2015(7), 9–17 (2015)
2. Alperovitch, D.: Towards establishment of cyberspace deterrence strategy. In: 2011 3rd International Conference on Cyber Conflict, pp. 1–8 (2011)
3. BBC Technology: Ransomware cyber-attack threat escalating - Europol - BBC News (2017). http://www.bbc.co.uk/news/technology-39913630
4. Betts, R.K.: The lost logic of deterrence. Foreign Aff. 1(87), 87–99 (2013)
5. Bhatt, P., Yano, E.T., Gustavsson, P.: Towards a framework to detect multi-stage advanced persistent threats attacks. In: Proceedings of IEEE 8th International Symposium on Service Oriented System Engineering, SOSE 2014, pp. 390–395 (2014)