Author:
Sakthivelu U.,Vinoth Kumar C. N. S.
Publisher
Springer Nature Singapore
Reference25 articles.
1. Friedberg I, Skopik F, Settanni G, Fiedler R (2015) Combating advanced persistent threats: from network event correlation to incident detection. Syst Secur 48:35–57
2. Wu W (2016) Identifying of command and control the APT based on independent access. In: International conference on communication (ICC)-2016. IEEE, pp 1–6
3. Vinoth Kumar CNS, Suhasini A (2017) Improved secure three-tier architecture for WSN using hop-field chaotic neural network with two stage encryption. In: IEEE Explorer Digital Library entitled on 15th August 2017, ISBN-978-1-5090-4432-0. https://doi.org/10.1109/ICCECE.2016.8009540
4. Chandra J, Challa N, Hussain A (2014) Data and information storage security from APT in cloud computing. Int J Appl Eng Res 9(20):7755–7768
5. Sexton J, Storlie C, Neil J (2015) Attack chain detection. Data mining and static analyse science. J 8(5–6):353–363
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A multi-step APT attack detection using hidden Markov models by molecular magnetic sensors;Optical and Quantum Electronics;2023-12-29
2. An Enhanced Network Security using Machine Learning and Behavioral Analysis;2023 International Conference for Advancement in Technology (ICONAT);2023-01-24
3. Improved Security for Cloud Storage Using Elgamal Algorithms Authentication Key Validation;2023 International Conference for Advancement in Technology (ICONAT);2023-01-24
4. Sports Data Visualization and Betting;2022 International Conference on Smart Generation Computing, Communication and Networking (SMART GENCON);2022-12-23