Author:
Vishnu Priya M. K.,Shankar Sriram V. S.
Publisher
Springer Nature Singapore
Reference67 articles.
1. D. Craigen, N. Diakun-Thibault, R. Purse, Defining cybersecurity. Technol. Innov. Manag. Rev. 4(10) (2014)
2. B. Stojanović, K. Hofer-Schmitz, U. Kleb, APT datasets and attack modeling for automated detection methods: a review. Comput. Secur. 92, 101734 (2020)
3. Swisscom, Targeted Attacks Cyber Security Report 2019; Technical report (Swisscom (Switzerland) Ltd. Group Security, Bern, 2019)
4. A. Alshamrani, S. Myneni, A. Chowdhary, D. Huang.: A survey on advanced persistent threats: techniques, solutions, challenges, and research opportunities. IEEE Commun. Surv. Tutorials 21(2), 1851–1877 (2019)
5. W. Niu, X. Zhang, G.W. Yang, J. Zhu, Z. Ren, Identifying APT malware domain based on mobile DNS logging. Math. Probl. Eng. (2017)