1. Detection of advanced persistent threats using system and attack intelligence;Redondo-Hernández,2015
2. Detecting false emergency requests using callers’ reporting behaviors and locations;Firoozjaei,2016
3. The optimized attribute attack graph based on APT attack stage model;Li,2016
4. Bayesian network based weighted APT attack paths modeling in cloud computing;Zimba;Future Gener. Comput. Syst.,2019
5. Malware for cyber-physical attacks;Shrivastava,2016