共 34 条
- [1] Jian L., Rui S.P., Min Y., Et al., Software and cyber security-a survey, Journal of Software, 29, 1, pp. 1-20, (2018)
- [2] Xiao L., Xu D., Xie C., Et al., Cloud storage defense against advanced persistent threats: a prospect theoretic study, IEEE Journal on Selected Areas in Communications, 35, 3, pp. 534-544, (2017)
- [3] Albuquerque R.O., Orozco A.L.S., Kim T.H., Leveraging information security and computational trust for cybersecurity, Journal of Supercomputing, 72, 10, pp. 3729-3763, (2016)
- [4] Singh S., Sharma P.K., Moon S.Y., Et al., A comprehensive study on APT attacks and countermeasures for future networks and communications: challenges and solutions, Journal of Supercomputing, 72, pp. 1-32, (2016)
- [5] Friedberg I., Skopik F., Settanni G., Et al., Combating advanced persistent threats: from network event correlation to incident detection, Computers & Security, 48, 7, pp. 35-57, (2015)
- [6] Xenakis C., Ntantogian C., An advanced persistent threat in 3G networks: attacking the home network from roaming networks, Computers & Security, 40, 2, pp. 84-94, (2014)
- [7] Lin W.C., Ke S.W., Tsai C.F., CANN: an intrusion detection system based on combining cluster centers and nearest neighbors, Knowledge-based Systems, 78, 1, pp. 13-21, (2015)
- [8] Schindler T., Anomaly detection in log data using graph databases and machine learning to defend advanced persistent threats
- [9] Moya J.R., Decastrogarcia N., Fernandezdiaz R., Et al., Expert knowledge and data analysis for detecting advanced persistent threats, Open Mathematics, 15, 1, pp. 45-49, (2017)
- [10] Moon D., Im H., Kim I., Et al., DTB-IDS: an intrusion detection system based on decision tree using behavior analysis for preventing APT attacks, Journal of Supercomputing, 73, 7, pp. 1-15, (2015)