Author:
Sakthivelu U.,Vinoth Kumar C. N. S.
Publisher
Springer Nature Singapore
Reference25 articles.
1. Friedberg I, Skopik F, Settanni G, Fiedler R (2015) Combating advanced persistent threats: from network event correlation to incident detection. Syst Secur 48:35–57
2. Wu W (2016) Identifying of command and control the APT based on independent access. In: International conference on communication (ICC)-2016. IEEE, pp 1–6
3. Vinoth Kumar CNS, Suhasini A (2017) Improved secure three-tier architecture for WSN using hop-field chaotic neural network with two stage encryption. In: IEEE Explorer Digital Library entitled on 15th August 2017, ISBN-978-1-5090-4432-0. https://doi.org/10.1109/ICCECE.2016.8009540
4. Chandra J, Challa N, Hussain A (2014) Data and information storage security from APT in cloud computing. Int J Appl Eng Res 9(20):7755–7768
5. Sexton J, Storlie C, Neil J (2015) Attack chain detection. Data mining and static analyse science. J 8(5–6):353–363
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献