Academic literature on the topic 'Advanced persistent threats (APT)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Advanced persistent threats (APT).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Advanced persistent threats (APT)"
Akuffo-Badoo, Erastus B. "Understanding Advanced Persistent Threats." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 15–22. http://dx.doi.org/10.22624/aims/crp-bk3-p3.
Full textNicho, Mathew, and Shafaq Khan. "Identifying Vulnerabilities of Advanced Persistent Threats." International Journal of Information Security and Privacy 8, no. 1 (2014): 1–18. http://dx.doi.org/10.4018/ijisp.2014010101.
Full textPashupatimath, Anand. "Novel Approach to Detect APT (Advanced Persistent Threat)." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (2024): 2440–45. http://dx.doi.org/10.22214/ijraset.2024.60342.
Full textAdem Şimşek, Adem Şimşek. "DETECTION OF ADVANCED PERSISTENT THREATS USING SIEM RULESETS." PIRETC-Proceeding of The International Research Education & Training Centre 28, no. 07 (2023): 25–31. http://dx.doi.org/10.36962/piretc28072023-25.
Full textAJIBOLA, Aminat, Innocent UJATA, Oluwasegun ADELAIYE, and Noorihan Abdul RAHMAN. "Mitigating Advanced Persistent Threats: A Comparative Evaluation Review." International Journal of Information Security and Cybercrime 8, no. 2 (2019): 9–20. http://dx.doi.org/10.19107/ijisc.2019.02.01.
Full textBrandao, Pedro Ramos. "Advanced Persistent Threats (APT)-Attribution-MICTIC Framework Extension." Journal of Computer Science 17, no. 5 (2021): 470–79. http://dx.doi.org/10.3844/jcssp.2021.470.479.
Full textAustin, Orumwense, and Ihsan Mansoor. "The Impact of Emerging Cloud Security Threats: A Focus on Advanced Persistent Threats." International Journal of Innovative Science and Research Technology (IJISRT) 9, no. 12 (2025): 2227–38. https://doi.org/10.5281/zenodo.14598602.
Full textLi, Jingwen, Jianyi Liu, and Ru Zhang. "Advanced Persistent Threat Group Correlation Analysis via Attack Behavior Patterns and Rough Sets." Electronics 13, no. 6 (2024): 1106. http://dx.doi.org/10.3390/electronics13061106.
Full textNkiru, Ezefosie, and Ohemu Monday Fredrick. "A Data Driven Anomaly Based Behavior Detection Method for Advanced Persistent Threats (APT)." International Journal of Science and Research (IJSR) 10, no. 8 (2021): 663–67. https://doi.org/10.21275/sr21726172522.
Full textWang, Lun, Qiang Chen, and Daoming Li. "Managing Advanced Persistent Threats (APTs): Detection Strategies and Network Defense Mechanisms." Journal of Economic Theory and Business Management 1, no. 4 (2024): 9–17. https://doi.org/10.5281/zenodo.13212276.
Full textDissertations / Theses on the topic "Advanced persistent threats (APT)"
Brogi, Guillaume. "Real-time detection of Advanced Persistent Threats using Information Flow Tracking and Hidden Markov Models." Electronic Thesis or Diss., Paris, CNAM, 2018. http://www.theses.fr/2018CNAM1167.
Full textBrogi, Guillaume. "Real-time detection of Advanced Persistent Threats using Information Flow Tracking and Hidden Markov Models." Thesis, Paris, CNAM, 2018. http://www.theses.fr/2018CNAM1167/document.
Full textSun, Tithnara Nicolas. "Modélisation et analyse formelle de modèles système pour les menaces persistantes avancées." Electronic Thesis or Diss., Brest, École nationale supérieure de techniques avancées Bretagne, 2022. http://www.theses.fr/2022ENTA0004.
Full textBhatt, Parth. "A hadoop based framework for analyzing intrusion activities of advanced persistent threats." Instituto Tecnológico de Aeronáutica, 2013. http://www.bd.bibl.ita.br/tde_busca/arquivo.php?codArquivo=2831.
Full textBeyer, Dawn Marie. "Constructing a Cyber Preparedness Framework (CPF): The Lockheed Martin Case Study." NSUWorks, 2014. http://nsuworks.nova.edu/gscis_etd/90.
Full textLima, António João Caldeira. "Advanced persistent threats." Master's thesis, 2015. http://hdl.handle.net/10451/20168.
Full textChi, Hsiang, and 季祥. "A Study on the Impacts of Advanced Persistent Threat (APT) on Corporate Information Security Policy." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/10868642773761817807.
Full text"Software-defined Situation-aware Cloud Security." Doctoral diss., 2020. http://hdl.handle.net/2286/R.I.62942.
Full textLAURENZA, GIUSEPPE. "Critical infrastructures security: improving defense against novel malware and Advanced Persistent Threats." Doctoral thesis, 2020. http://hdl.handle.net/11573/1362189.
Full textGhafir, Ibrahim, K. G. Kyriakopoulos, S. Lambotharan, et al. "Hidden Markov models and alert correlations for the prediction of advanced persistent threats." 2019. http://hdl.handle.net/10454/17613.
Full textBooks on the topic "Advanced persistent threats (APT)"
Steffens, Timo. Attribution of Advanced Persistent Threats. Springer Berlin Heidelberg, 2020. http://dx.doi.org/10.1007/978-3-662-61313-9.
Full textSteffens, Timo. Attribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-Espionage. Springer Berlin / Heidelberg, 2021.
Find full textSteffens, Timo. Attribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-Espionage. Springer Vieweg, 2020.
Find full textAdvanced Persistent Threats Offensive Tactics For It Security Offensive Tactics For It Security. McGraw-Hill Education - Europe, 2014.
Find full textR. Fritz, Jason. China's Cyber Warfare. Published by Lexington Books, 2017. https://doi.org/10.5040/9781666988178.
Full textBook chapters on the topic "Advanced persistent threats (APT)"
Chen, Chia-Mei, Gu-Hsin Lai, and Dan-Wei Wen. "Evolution of Advanced Persistent Threat (APT) Attacks and Actors." In Communications in Computer and Information Science. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-9190-3_7.
Full textChuan, Bernard Lee Jin, Manmeet Mahinderjit Singh, and Azizul Rahman Mohd Shariff. "APTGuard : Advanced Persistent Threat (APT) Detections and Predictions using Android Smartphone." In Lecture Notes in Electrical Engineering. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-2622-6_53.
Full textSteffens, Timo. "Advanced Persistent Threats." In Attribution of Advanced Persistent Threats. Springer Berlin Heidelberg, 2020. http://dx.doi.org/10.1007/978-3-662-61313-9_1.
Full textSinghal, Anoop, and Peng Liu. "Advanced Persistent Threats." In Encyclopedia of Cryptography, Security and Privacy. Springer Berlin Heidelberg, 2023. http://dx.doi.org/10.1007/978-3-642-27739-9_1765-1.
Full textSinghal, Anoop, and Peng Liu. "Advanced Persistent Threats." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_1765.
Full textChen, Ping, Lieven Desmet, and Christophe Huygens. "A Study on Advanced Persistent Threats." In Advanced Information Systems Engineering. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-44885-4_5.
Full textSteffens, Timo. "False Flags." In Attribution of Advanced Persistent Threats. Springer Berlin Heidelberg, 2020. http://dx.doi.org/10.1007/978-3-662-61313-9_10.
Full textSteffens, Timo. "Group Set-Ups." In Attribution of Advanced Persistent Threats. Springer Berlin Heidelberg, 2020. http://dx.doi.org/10.1007/978-3-662-61313-9_11.
Full textSteffens, Timo. "Communication." In Attribution of Advanced Persistent Threats. Springer Berlin Heidelberg, 2020. http://dx.doi.org/10.1007/978-3-662-61313-9_12.
Full textSteffens, Timo. "Ethics of Attribution." In Attribution of Advanced Persistent Threats. Springer Berlin Heidelberg, 2020. http://dx.doi.org/10.1007/978-3-662-61313-9_13.
Full textConference papers on the topic "Advanced persistent threats (APT)"
Rani, Nanda, Bikash Saha, Ravi Kumar, and Sandeep Kumar Shukla. "Genesis of Cyber Threats: Towards Malware-based Advanced Persistent Threat (APT) Attribution." In 2024 IEEE 6th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA). IEEE, 2024. https://doi.org/10.1109/tps-isa62245.2024.00052.
Full textRamamoorthy, Jayanthi, Cihan Varol, and Narasimha K. Shashidhar. "APT Warfare: Technical Arsenal and Target Profiles of Linux Malware in Advanced Persistent Threats." In 2024 8th Cyber Security in Networking Conference (CSNet). IEEE, 2024. https://doi.org/10.1109/csnet64211.2024.10851718.
Full textBenabderrahmane, Sidahmed, Petko Valtchev, James Cheney, and Talal Rahwan. "APT-LLM: Embedding-Based Anomaly Detection of Cyber Advanced Persistent Threats Using Large Language Models." In 2025 13th International Symposium on Digital Forensics and Security (ISDFS). IEEE, 2025. https://doi.org/10.1109/isdfs65363.2025.11011912.
Full textKiruthika Devi, B. S., Subramanyam Challa, and Barathi K. "Advanced Persistent Threat (APT) and Remote Access Trojan (RAT) Simulation and Mitigation." In 2025 7th International Conference on Signal Processing, Computing and Control (ISPCC). IEEE, 2025. https://doi.org/10.1109/ispcc66872.2025.11039391.
Full textG, Kirubavathi, and Guruakshya C. "An Ensemble Stacked Boosting Framework for Advanced Persistent Threat (APT) Detection in the Industrial Internet of Things(IIoT)." In 2024 4th International Conference on Mobile Networks and Wireless Communications (ICMNWC). IEEE, 2024. https://doi.org/10.1109/icmnwc63764.2024.10872233.
Full textBarcan, Alexandra, Mircea Badoi, Gabriel Nedianu, Daniel Ciochiu, Claudiu Traistaru, and Nicolae Enescu. "Advanced Persistent Threats." In 2024 23rd RoEduNet Conference: Networking in Education and Research (RoEduNet). IEEE, 2024. http://dx.doi.org/10.1109/roedunet64292.2024.10722615.
Full textSairam, M. Sujith, M. Shaval Khan, R. Vigneshwaran, S. Yaswanth Kumar, and M. Deva Priya. "A Novel Approach for Detecting Advanced Persistent Threats." In 2024 10th International Conference on Advanced Computing and Communication Systems (ICACCS). IEEE, 2024. http://dx.doi.org/10.1109/icaccs60874.2024.10717022.
Full textGuo, Zhida, Xiaoli Li, Haobin Shen, Xiaolu Zhang, Wanji Wang, and Dehua Xie. "Detecting advanced persistent threats via casual graph neural network." In International Conference on Network Communication and Information Security (ICNCIS 2024), edited by Pascal Lorenz and Ljiljana Trajkovic. SPIE, 2025. https://doi.org/10.1117/12.3052125.
Full textFrancis, Georges, Majed Sanan, Makram Hatoum, Nader Bakir, and Khouloud Samrouth. "Detecting Advanced Persistent Threats on a Network Using Machine Learning." In 2024 International Conference on Smart Systems and Power Management (IC2SPM). IEEE, 2024. https://doi.org/10.1109/ic2spm62723.2024.10841340.
Full textViana, Caio M. C., Carlos H. G. Ferreira, Fabricio Murai, Aldri Luiz Dos Santos, and Lourenço Alves Pereira Júnior. "Devil in the Noise: Detecting Advanced Persistent Threats with Backbone Extraction." In 2024 IEEE Symposium on Computers and Communications (ISCC). IEEE, 2024. http://dx.doi.org/10.1109/iscc61673.2024.10733665.
Full textReports on the topic "Advanced persistent threats (APT)"
Cary, Dakota. Academics, AI, and APTs. Center for Security and Emerging Technology, 2021. http://dx.doi.org/10.51593/2020ca010.
Full text