1. E., C. Cyber Defense: Advanced Persistent Threat (APT) and Insider Threat. 2012 [cited 2016 19 September 2016]; Available from:
https://cyber-defense.sans.org/blog/2012/10/23/advanced-persistent-threat-apt-and-insider-threat
.
2. Tankard, C., Advanced persistent threats and how to monitor and deter them. Network security, 2011. 2011(8): p. 16-19.
3. FireEye. Anatomy of an APT (Advanced Persistent Threat) Attack. 2016 [cited 2016 20 September 2016]; Available from:
https://www.fireeye.com/current-threats/anatomy-of-a-cyber-attack.html
.
4. Sood, A.K. and R.J. Enbody, Targeted cyberattacks: a superset of advanced persistent threats. IEEE security & privacy, 2013. 11(1): p. 54-61.
5. Lab, K. Kaspersky Lab and SynerScope join forces to battle cyberthreats with big data analytics. [cited 2016 22 September 2016]; Available from:
http://www.kaspersky.co.in/about/news/business/2016/Kaspersky-Lab-and-SynerScope-join-forces-to-battle-cyberthreats-with-big-data-analytics
.