Affiliation:
1. School of Computer Science and Engineering, University of Electronic Science and Technology of China
Publisher
Institute of Electronics, Information and Communications Engineers (IEICE)
Subject
Artificial Intelligence,Electrical and Electronic Engineering,Computer Vision and Pattern Recognition,Hardware and Architecture,Software
Reference38 articles.
1. [1] P. Chen, L. Desmet, and C. Huygens, “A study on advanced persistent threats,” IFIP International Conference on Communications and Multimedia Security, pp.63-72, Springer, 2014. 10.1007/978-3-662-44885-4_5
2. [2] F. Li, A. Lai, and D. Ddl, “Evidence of advanced persistent threat: A case study of malware for political espionage,” 2011 6th International Conference on Malicious and Unwanted Software (MALWARE), pp.102-109, IEEE, 2011. 10.1109/malware.2011.6112333
3. [3] I. Jeun, Y. Lee, and D. Won, “A practical study on advanced persistent threats,” Computer Applications for Security, Control and System Engineering, pp.144-152, Springer, 2012. 10.1007/978-3-642-35264-5_21
4. [4] M. Ask, P. Bondarenko, J.E. Rekdal, A. Nordbø, P. Bloemerus, and D. Piatkivskyi, “Advanced persistent threat (APT) beyond the hype,” Project Report in IMT4582 Network Security at Gjøvik University College, Springer, 2013.
5. [5] M. Cloppert, “Security intelligence: Introduction (pt 1),” SANS Digital Forensics and Incident Response Blog, 2009.
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献