Author:
Zimba Aaron,Chen Hongsong,Wang Zhaoshun,Chishimba Mumbi
Funder
National Social Science Fund of China
Subject
Computer Networks and Communications,Hardware and Architecture,Software
Reference65 articles.
1. Data exfiltration: A review of external attack vectors and countermeasures;Ullah;J. Netw. Comput. Appl.,2018
2. Targeted cyberattacks: A superset of advanced persistent threats;Sood;IEEE Secur. Priv.,2013
3. Detecting Advanced Persistent Threats Based on Entropy and Support Vector Machine;Tan,2018
4. M. Marchetti, A. Guido, F. Pierazzi, M. Colajanni, Countering Advanced Persistent Threats through security intelligence and big data analytics, in: International Conference on Cyber Conflict, CYCON, 2016.
5. Analysis of high volumes of network traffic for advanced persistent threat detection;Marchetti;Comput. Netw.,2016
Cited by
61 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献