Academic literature on the topic 'Advanced persistent threats (APT)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Advanced persistent threats (APT).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Advanced persistent threats (APT)"

1

Akuffo-Badoo, Erastus B. "Understanding Advanced Persistent Threats." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 15–22. http://dx.doi.org/10.22624/aims/crp-bk3-p3.

Full text
Abstract:
Advanced Persistent Threats (APTs) are a new type of threat that has piqued the interest of experts, particularly in the industrial security industry. APTs are cyber-attacks carried out by skilled and well-resourced adversaries who target specific information in high-profile organizations and governments, usually as part of a multi-step operation. The academic community has largely ignored the specifics of these threats, and as a result, an objective solution to the APT problem is absent. In terms of cybercrime activity, Africa has been one of the fastest rising regions. The continent is also
APA, Harvard, Vancouver, ISO, and other styles
2

Nicho, Mathew, and Shafaq Khan. "Identifying Vulnerabilities of Advanced Persistent Threats." International Journal of Information Security and Privacy 8, no. 1 (2014): 1–18. http://dx.doi.org/10.4018/ijisp.2014010101.

Full text
Abstract:
One of the most serious and persistent threat that has emerged in recent years combining technical as well as non-technical skills is the Advanced Persistent Threat, commonly known as APT where hackers circumvent the organizational defenses and instead target the naivety of the employees in making an unintentional mistake. While this threat has gained prominence in recent years, research on its cause and mitigation is still at the infancy stage. In this paper the authors explore APT vulnerabilities from an organizational perspective to create a taxonomy of non-technical and technical vulnerabi
APA, Harvard, Vancouver, ISO, and other styles
3

Pashupatimath, Anand. "Novel Approach to Detect APT (Advanced Persistent Threat)." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (2024): 2440–45. http://dx.doi.org/10.22214/ijraset.2024.60342.

Full text
Abstract:
Abstract: In cyber security, APT stands for Advanced Persistent Threat. It refers to advanced and long-term cyber-attacks where an attacker gains unauthorized access to a network and remains invisible for a long period of time. APTs are difficult to detect and require a comprehensive security strategy that includes threat intelligence, technical intelligence, and continuous monitoring to effectively mitigate risk. This paper introduces a different approach to APT prevention by integrating advanced threat intelligence, machine learning algorithms, and proactive defense mechanisms. Our approach
APA, Harvard, Vancouver, ISO, and other styles
4

Adem Şimşek, Adem Şimşek. "DETECTION OF ADVANCED PERSISTENT THREATS USING SIEM RULESETS." PIRETC-Proceeding of The International Research Education & Training Centre 28, no. 07 (2023): 25–31. http://dx.doi.org/10.36962/piretc28072023-25.

Full text
Abstract:
Cyber-attacks move towards a sophisticated, destructive, and persistent position, as in the case of Stuxnet, Dark Hotel, Poseidon, and Carbanak. These attacks are called Advanced Persistent Threats (APT) in which an intruder establishes an undetected presence in a network in order to steal sensitive data over a prolonged period of time. In today's digitalized life, these attacks threaten the main critical life areas. This threat is followed by critical infrastructures, finance, energy, and aviation agencies. One of the biggest APT attacks was Stuxnet which targeted software on computers contro
APA, Harvard, Vancouver, ISO, and other styles
5

AJIBOLA, Aminat, Innocent UJATA, Oluwasegun ADELAIYE, and Noorihan Abdul RAHMAN. "Mitigating Advanced Persistent Threats: A Comparative Evaluation Review." International Journal of Information Security and Cybercrime 8, no. 2 (2019): 9–20. http://dx.doi.org/10.19107/ijisc.2019.02.01.

Full text
Abstract:
Cyber threats have been an issue of great concern since the advent of the information (computer and internet) age. But of greater concern is the most recent class of threats, known as Advanced Persistent Threats (APTs). It has drawn increasing attention all over the world, from researchers, and the industrial security sector. APTs are sophisticated cyber-attacks executed by sophisticated and well-resourced adversaries targeting specific information in companies and government. APT is a long-term campaign involving different steps. This form of attack if successful has significant implications t
APA, Harvard, Vancouver, ISO, and other styles
6

Brandao, Pedro Ramos. "Advanced Persistent Threats (APT)-Attribution-MICTIC Framework Extension." Journal of Computer Science 17, no. 5 (2021): 470–79. http://dx.doi.org/10.3844/jcssp.2021.470.479.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Austin, Orumwense, and Ihsan Mansoor. "The Impact of Emerging Cloud Security Threats: A Focus on Advanced Persistent Threats." International Journal of Innovative Science and Research Technology (IJISRT) 9, no. 12 (2025): 2227–38. https://doi.org/10.5281/zenodo.14598602.

Full text
Abstract:
The rapid advancement in cloud computing technology is continually evolving, with threat actors refining their tactics, exploiting new vulnerabilities, and expanding their influence. This dynamic environment exposes cloud infrastructure to emerging cyber-attacks, including Advanced Persistent Threats (APT), impacting both customers and service providers. Understanding the gap in APT detection literature is crucial for researchers. The research aims to comprehensively understand APTs' influence on cloud security, analyse existing approaches, emulate adversary plans, simulate attacks using Mitre
APA, Harvard, Vancouver, ISO, and other styles
8

Li, Jingwen, Jianyi Liu, and Ru Zhang. "Advanced Persistent Threat Group Correlation Analysis via Attack Behavior Patterns and Rough Sets." Electronics 13, no. 6 (2024): 1106. http://dx.doi.org/10.3390/electronics13061106.

Full text
Abstract:
In recent years, advanced persistent threat (APT) attacks have become a significant network security threat due to their concealment and persistence. Correlation analysis of APT groups is vital for understanding the global network security landscape and accurately attributing threats. Current studies on threat attribution rely on experts or advanced technology to identify evidence linking attack incidents to known APT groups. However, there is a lack of research focused on automatically discovering potential correlations between APT groups. This paper proposes a method using attack behavior pa
APA, Harvard, Vancouver, ISO, and other styles
9

Nkiru, Ezefosie, and Ohemu Monday Fredrick. "A Data Driven Anomaly Based Behavior Detection Method for Advanced Persistent Threats (APT)." International Journal of Science and Research (IJSR) 10, no. 8 (2021): 663–67. https://doi.org/10.21275/sr21726172522.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Lun, Qiang Chen, and Daoming Li. "Managing Advanced Persistent Threats (APTs): Detection Strategies and Network Defense Mechanisms." Journal of Economic Theory and Business Management 1, no. 4 (2024): 9–17. https://doi.org/10.5281/zenodo.13212276.

Full text
Abstract:
Advanced Persistent Threats (APTs) represent one of the most significant challenges in cybersecurity today. These threats are characterized by their stealthy, sophisticated, and persistent nature, often targeting high-value entities such as government institutions, financial systems, and critical infrastructure. This paper explores the nature of APTs, focusing on detection strategies and network defense mechanisms. Through a comprehensive review of existing literature and case studies, the paper presents an in-depth analysis of how APTs operate and how organizations can effectively detect and
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Advanced persistent threats (APT)"

1

Brogi, Guillaume. "Real-time detection of Advanced Persistent Threats using Information Flow Tracking and Hidden Markov Models." Electronic Thesis or Diss., Paris, CNAM, 2018. http://www.theses.fr/2018CNAM1167.

Full text
Abstract:
Dans cette thèse, nous présentons les risques posés par les Menaces Persistentes Avancées (APTs) et proposons une approche en deux temps pour distinguer les attaques qui en font partie. Ce travail fait partie d'Akheros, un Système de Détection d'Intrusion (IDS) autonome développé par trois doctorants. L'idée est d'utiliser l'apprentissage machine pour détecté des évènements inattendus et vérifier s'ils posent un risque de sécurité. La dernière étape, et le sujet de cette thèse, est de mettre en évidence les APT. Les campagnes d'APT sont particulièrement dangereuses car les attaquants sont comp
APA, Harvard, Vancouver, ISO, and other styles
2

Brogi, Guillaume. "Real-time detection of Advanced Persistent Threats using Information Flow Tracking and Hidden Markov Models." Thesis, Paris, CNAM, 2018. http://www.theses.fr/2018CNAM1167/document.

Full text
Abstract:
Dans cette thèse, nous présentons les risques posés par les Menaces Persistentes Avancées (APTs) et proposons une approche en deux temps pour distinguer les attaques qui en font partie. Ce travail fait partie d'Akheros, un Système de Détection d'Intrusion (IDS) autonome développé par trois doctorants. L'idée est d'utiliser l'apprentissage machine pour détecté des évènements inattendus et vérifier s'ils posent un risque de sécurité. La dernière étape, et le sujet de cette thèse, est de mettre en évidence les APT. Les campagnes d'APT sont particulièrement dangereuses car les attaquants sont comp
APA, Harvard, Vancouver, ISO, and other styles
3

Sun, Tithnara Nicolas. "Modélisation et analyse formelle de modèles système pour les menaces persistantes avancées." Electronic Thesis or Diss., Brest, École nationale supérieure de techniques avancées Bretagne, 2022. http://www.theses.fr/2022ENTA0004.

Full text
Abstract:
La criticité croissante des systèmes industriels les expose davantage aux menaces du monde cyber. En particulier les menaces persistantes avancées ou Advanced Persistent Threats (APT) sont des attaquants sophistiqués dotés de ressources conséquentes et ciblant spécifiquement les systèmes critiques. Les méthodologies de cyber-défense actuelles permettent de protéger les systèmes contre les cyber-menaces classiques mais elles peinent à contrer efficacement les APT. En effet, les APT usent de stratégies complexes et de tactiques de dissimulation qui les rendent difficile à contrecarrer. Pour répo
APA, Harvard, Vancouver, ISO, and other styles
4

Bhatt, Parth. "A hadoop based framework for analyzing intrusion activities of advanced persistent threats." Instituto Tecnológico de Aeronáutica, 2013. http://www.bd.bibl.ita.br/tde_busca/arquivo.php?codArquivo=2831.

Full text
Abstract:
Intruders often remain persistent and stealthy in order to regularly exfilterate the continuously evolving critical information of their target organization. This compels them to rapidly discover new and advanced techniques for exploiting the target environment in order to trespass the security mechanisms. Such adversaries are known as Advanced Persistent Threats (APT). APTs heavily use their target system';s unknown vulnerabilities. Therefore, even with highly monitored networks, defenders are able to detect their footprints only in later phases of the intrusion. Moreover, highly monitoring t
APA, Harvard, Vancouver, ISO, and other styles
5

Beyer, Dawn Marie. "Constructing a Cyber Preparedness Framework (CPF): The Lockheed Martin Case Study." NSUWorks, 2014. http://nsuworks.nova.edu/gscis_etd/90.

Full text
Abstract:
The protection of sensitive data and technologies is critical in preserving United States (U.S.) national security and minimizing economic losses. However, during a cyber attack, the operational capability to constrain the exfiltrations of sensitive data and technologies may not be available. A cyber preparedness methodology (CPM) can improve operational capability and cyber security. The CPM enables a corporation to (a) characterize cyber threats; (b) determine the level of preparedness necessary to ensure mission success; (c) facilitate strategic planning for cyber security (CS); and (d) est
APA, Harvard, Vancouver, ISO, and other styles
6

Lima, António João Caldeira. "Advanced persistent threats." Master's thesis, 2015. http://hdl.handle.net/10451/20168.

Full text
Abstract:
Tese de mestrado, Segurança Informática, Universidade de Lisboa, Faculdade de Ciências, 2015<br>Os sistemas computacionais tornaram-se uma parte importante da nossa sociedade, para além de estarmos intrinsecamente ligados a eles, a maioria da informação que utilizamos no nosso dia-a-dia está no seu formato digital. Ao contrário de um documento físico, um documento digital está exposto a uma maior variedade de ameaças, principalmente se estiver de alguma forma disponível `a Internet. Informação é poder, por isso não é de admirar que alguém, algures esteja a tentar roubá-la, assim, é facto que o
APA, Harvard, Vancouver, ISO, and other styles
7

Chi, Hsiang, and 季祥. "A Study on the Impacts of Advanced Persistent Threat (APT) on Corporate Information Security Policy." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/10868642773761817807.

Full text
Abstract:
碩士<br>中國文化大學<br>資訊管理學系碩士在職專班<br>102<br>Prevention from hackers is an important issue for government and corporate in Internet era. It is particularly truly when information security (InfoSec) paradigm has shifted into the Advanced Persistent Threat (APT) Mode of targeted attack, which then makes traditional security methods insufficient in dealing with the complexity of these new threats. How to refine and design suitable policies or principles for government and corporate information systems, therefore, become vital but unanswered challenges. To help governments and enterprises react to the c
APA, Harvard, Vancouver, ISO, and other styles
8

"Software-defined Situation-aware Cloud Security." Doctoral diss., 2020. http://hdl.handle.net/2286/R.I.62942.

Full text
Abstract:
abstract: The use of reactive security mechanisms in enterprise networks can, at times, provide an asymmetric advantage to the attacker. Similarly, the use of a proactive security mechanism like Moving Target Defense (MTD), if performed without analyzing the effects of security countermeasures, can lead to security policy and service level agreement violations. In this thesis, I explore the research questions 1) how to model attacker-defender interactions for multi-stage attacks? 2) how to efficiently deploy proactive (MTD) security countermeasures in a software-defined environment for single
APA, Harvard, Vancouver, ISO, and other styles
9

LAURENZA, GIUSEPPE. "Critical infrastructures security: improving defense against novel malware and Advanced Persistent Threats." Doctoral thesis, 2020. http://hdl.handle.net/11573/1362189.

Full text
Abstract:
Protection of Critical Infrastructures (CIs) is vital for the survival of society. Any functionality reduction or interruption can cause heavy damages to people. Stuxnet and Wannacry are clear proofs that the world is changed and now attackers target CIs mainly through cyber-space. The rapid evolution of adversaries' skills provokes an overwhelming raising in the difficulty of defense. Tons of malware are released every day and malware analysts cannot be fast enough to analyze all of them and react in time. Moreover, classical security software, such as anti-virus, cannot help, due to the huge
APA, Harvard, Vancouver, ISO, and other styles
10

Ghafir, Ibrahim, K. G. Kyriakopoulos, S. Lambotharan, et al. "Hidden Markov models and alert correlations for the prediction of advanced persistent threats." 2019. http://hdl.handle.net/10454/17613.

Full text
Abstract:
Yes<br>Cyber security has become a matter of a global interest, and several attacks target industrial companies and governmental organizations. The advanced persistent threats (APTs) have emerged as a new and complex version of multi-stage attacks (MSAs), targeting selected companies and organizations. Current APT detection systems focus on raising the detection alerts rather than predicting APTs. Forecasting the APT stages not only reveals the APT life cycle in its early stages but also helps to understand the attacker's strategies and aims. This paper proposes a novel intrusion detection sys
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Advanced persistent threats (APT)"

1

Steffens, Timo. Attribution of Advanced Persistent Threats. Springer Berlin Heidelberg, 2020. http://dx.doi.org/10.1007/978-3-662-61313-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Steffens, Timo. Attribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-Espionage. Springer Berlin / Heidelberg, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Steffens, Timo. Attribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-Espionage. Springer Vieweg, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Advanced Persistent Threats Offensive Tactics For It Security Offensive Tactics For It Security. McGraw-Hill Education - Europe, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

R. Fritz, Jason. China's Cyber Warfare. Published by Lexington Books, 2017. https://doi.org/10.5040/9781666988178.

Full text
Abstract:
The turn of the century was accompanied by two historically significant phenomena. One was the emergence of computer networks as a vital component of advanced militaries and interdependent global economic systems. The second concerned China’s rise on the global stage through economic reforms that led to sustained growth and military modernization. At the same time, Chinese government policies and actions have drawn international criticisms including persistent allegations of online espionage, domestic Internet censorship, and an increased military capability, all of which utilize computer netw
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Advanced persistent threats (APT)"

1

Chen, Chia-Mei, Gu-Hsin Lai, and Dan-Wei Wen. "Evolution of Advanced Persistent Threat (APT) Attacks and Actors." In Communications in Computer and Information Science. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-9190-3_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chuan, Bernard Lee Jin, Manmeet Mahinderjit Singh, and Azizul Rahman Mohd Shariff. "APTGuard : Advanced Persistent Threat (APT) Detections and Predictions using Android Smartphone." In Lecture Notes in Electrical Engineering. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-2622-6_53.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Steffens, Timo. "Advanced Persistent Threats." In Attribution of Advanced Persistent Threats. Springer Berlin Heidelberg, 2020. http://dx.doi.org/10.1007/978-3-662-61313-9_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Singhal, Anoop, and Peng Liu. "Advanced Persistent Threats." In Encyclopedia of Cryptography, Security and Privacy. Springer Berlin Heidelberg, 2023. http://dx.doi.org/10.1007/978-3-642-27739-9_1765-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Singhal, Anoop, and Peng Liu. "Advanced Persistent Threats." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_1765.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, Ping, Lieven Desmet, and Christophe Huygens. "A Study on Advanced Persistent Threats." In Advanced Information Systems Engineering. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-44885-4_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Steffens, Timo. "False Flags." In Attribution of Advanced Persistent Threats. Springer Berlin Heidelberg, 2020. http://dx.doi.org/10.1007/978-3-662-61313-9_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Steffens, Timo. "Group Set-Ups." In Attribution of Advanced Persistent Threats. Springer Berlin Heidelberg, 2020. http://dx.doi.org/10.1007/978-3-662-61313-9_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Steffens, Timo. "Communication." In Attribution of Advanced Persistent Threats. Springer Berlin Heidelberg, 2020. http://dx.doi.org/10.1007/978-3-662-61313-9_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Steffens, Timo. "Ethics of Attribution." In Attribution of Advanced Persistent Threats. Springer Berlin Heidelberg, 2020. http://dx.doi.org/10.1007/978-3-662-61313-9_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Advanced persistent threats (APT)"

1

Rani, Nanda, Bikash Saha, Ravi Kumar, and Sandeep Kumar Shukla. "Genesis of Cyber Threats: Towards Malware-based Advanced Persistent Threat (APT) Attribution." In 2024 IEEE 6th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA). IEEE, 2024. https://doi.org/10.1109/tps-isa62245.2024.00052.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ramamoorthy, Jayanthi, Cihan Varol, and Narasimha K. Shashidhar. "APT Warfare: Technical Arsenal and Target Profiles of Linux Malware in Advanced Persistent Threats." In 2024 8th Cyber Security in Networking Conference (CSNet). IEEE, 2024. https://doi.org/10.1109/csnet64211.2024.10851718.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Benabderrahmane, Sidahmed, Petko Valtchev, James Cheney, and Talal Rahwan. "APT-LLM: Embedding-Based Anomaly Detection of Cyber Advanced Persistent Threats Using Large Language Models." In 2025 13th International Symposium on Digital Forensics and Security (ISDFS). IEEE, 2025. https://doi.org/10.1109/isdfs65363.2025.11011912.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kiruthika Devi, B. S., Subramanyam Challa, and Barathi K. "Advanced Persistent Threat (APT) and Remote Access Trojan (RAT) Simulation and Mitigation." In 2025 7th International Conference on Signal Processing, Computing and Control (ISPCC). IEEE, 2025. https://doi.org/10.1109/ispcc66872.2025.11039391.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

G, Kirubavathi, and Guruakshya C. "An Ensemble Stacked Boosting Framework for Advanced Persistent Threat (APT) Detection in the Industrial Internet of Things(IIoT)." In 2024 4th International Conference on Mobile Networks and Wireless Communications (ICMNWC). IEEE, 2024. https://doi.org/10.1109/icmnwc63764.2024.10872233.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Barcan, Alexandra, Mircea Badoi, Gabriel Nedianu, Daniel Ciochiu, Claudiu Traistaru, and Nicolae Enescu. "Advanced Persistent Threats." In 2024 23rd RoEduNet Conference: Networking in Education and Research (RoEduNet). IEEE, 2024. http://dx.doi.org/10.1109/roedunet64292.2024.10722615.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sairam, M. Sujith, M. Shaval Khan, R. Vigneshwaran, S. Yaswanth Kumar, and M. Deva Priya. "A Novel Approach for Detecting Advanced Persistent Threats." In 2024 10th International Conference on Advanced Computing and Communication Systems (ICACCS). IEEE, 2024. http://dx.doi.org/10.1109/icaccs60874.2024.10717022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Guo, Zhida, Xiaoli Li, Haobin Shen, Xiaolu Zhang, Wanji Wang, and Dehua Xie. "Detecting advanced persistent threats via casual graph neural network." In International Conference on Network Communication and Information Security (ICNCIS 2024), edited by Pascal Lorenz and Ljiljana Trajkovic. SPIE, 2025. https://doi.org/10.1117/12.3052125.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Francis, Georges, Majed Sanan, Makram Hatoum, Nader Bakir, and Khouloud Samrouth. "Detecting Advanced Persistent Threats on a Network Using Machine Learning." In 2024 International Conference on Smart Systems and Power Management (IC2SPM). IEEE, 2024. https://doi.org/10.1109/ic2spm62723.2024.10841340.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Viana, Caio M. C., Carlos H. G. Ferreira, Fabricio Murai, Aldri Luiz Dos Santos, and Lourenço Alves Pereira Júnior. "Devil in the Noise: Detecting Advanced Persistent Threats with Backbone Extraction." In 2024 IEEE Symposium on Computers and Communications (ISCC). IEEE, 2024. http://dx.doi.org/10.1109/iscc61673.2024.10733665.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Advanced persistent threats (APT)"

1

Cary, Dakota. Academics, AI, and APTs. Center for Security and Emerging Technology, 2021. http://dx.doi.org/10.51593/2020ca010.

Full text
Abstract:
Six Chinese universities have relationships with Advanced Persistent Threat (APT) hacking teams. Their activities range from recruitment to running cyber operations. These partnerships, themselves a case study in military-civil fusion, allow state-sponsored hackers to quickly move research from the lab to the field. This report examines these universities’ relationships with known APTs and analyzes the schools’ AI/ML research that may translate to future operational capabilities.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!