Journal articles on the topic 'Advanced persistent threats (APT)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Advanced persistent threats (APT).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Akuffo-Badoo, Erastus B. "Understanding Advanced Persistent Threats." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 15–22. http://dx.doi.org/10.22624/aims/crp-bk3-p3.
Full textNicho, Mathew, and Shafaq Khan. "Identifying Vulnerabilities of Advanced Persistent Threats." International Journal of Information Security and Privacy 8, no. 1 (2014): 1–18. http://dx.doi.org/10.4018/ijisp.2014010101.
Full textPashupatimath, Anand. "Novel Approach to Detect APT (Advanced Persistent Threat)." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (2024): 2440–45. http://dx.doi.org/10.22214/ijraset.2024.60342.
Full textAdem Şimşek, Adem Şimşek. "DETECTION OF ADVANCED PERSISTENT THREATS USING SIEM RULESETS." PIRETC-Proceeding of The International Research Education & Training Centre 28, no. 07 (2023): 25–31. http://dx.doi.org/10.36962/piretc28072023-25.
Full textAJIBOLA, Aminat, Innocent UJATA, Oluwasegun ADELAIYE, and Noorihan Abdul RAHMAN. "Mitigating Advanced Persistent Threats: A Comparative Evaluation Review." International Journal of Information Security and Cybercrime 8, no. 2 (2019): 9–20. http://dx.doi.org/10.19107/ijisc.2019.02.01.
Full textBrandao, Pedro Ramos. "Advanced Persistent Threats (APT)-Attribution-MICTIC Framework Extension." Journal of Computer Science 17, no. 5 (2021): 470–79. http://dx.doi.org/10.3844/jcssp.2021.470.479.
Full textAustin, Orumwense, and Ihsan Mansoor. "The Impact of Emerging Cloud Security Threats: A Focus on Advanced Persistent Threats." International Journal of Innovative Science and Research Technology (IJISRT) 9, no. 12 (2025): 2227–38. https://doi.org/10.5281/zenodo.14598602.
Full textLi, Jingwen, Jianyi Liu, and Ru Zhang. "Advanced Persistent Threat Group Correlation Analysis via Attack Behavior Patterns and Rough Sets." Electronics 13, no. 6 (2024): 1106. http://dx.doi.org/10.3390/electronics13061106.
Full textNkiru, Ezefosie, and Ohemu Monday Fredrick. "A Data Driven Anomaly Based Behavior Detection Method for Advanced Persistent Threats (APT)." International Journal of Science and Research (IJSR) 10, no. 8 (2021): 663–67. https://doi.org/10.21275/sr21726172522.
Full textWang, Lun, Qiang Chen, and Daoming Li. "Managing Advanced Persistent Threats (APTs): Detection Strategies and Network Defense Mechanisms." Journal of Economic Theory and Business Management 1, no. 4 (2024): 9–17. https://doi.org/10.5281/zenodo.13212276.
Full textMITTAL, Raghav, Ivan CVITIĆ, Dragan PERAKOVIĆ, and Soosaimarian Peter RAJA. "Proactive Detection and Mitigation Strategies for Advanced Persistent Threats." Promet - Traffic&Transportation 37, no. 3 (2025): 546–69. https://doi.org/10.7307/ptt.v37i3.1088.
Full textOkwara, Jerry Chizoba, and Abba Kyari Buba. "Ensemble classifiers for detection of advanced persistent threats." Global Journal of Engineering and Technology Advances 2, no. 2 (2021): 001–10. https://doi.org/10.5281/zenodo.4467346.
Full textKeliris, Anastasis, and Michail Maniatakos. "Demystifying Advanced Persistent Threats for Industrial Control Systems." Mechanical Engineering 139, no. 03 (2017): S13—S17. http://dx.doi.org/10.1115/1.2017-mar-6.
Full textBrandao, Pedro. "Combating Advanced Persistent Threats through Artificial Intelligence: An Algorithmic Approach." Open Research Europe 5 (May 20, 2025): 139. https://doi.org/10.12688/openreseurope.20268.1.
Full textLiu, Fa Gui, and Xiao Jie Zhang. "Research and Design of a Trusted Distributed File System Based on HDFS." Applied Mechanics and Materials 602-605 (August 2014): 3282–84. http://dx.doi.org/10.4028/www.scientific.net/amm.602-605.3282.
Full textAbdul, Khadar A., Shrishail Math Dr., Brahmananda S. H. Dr., and Shivamurthy G. Dr. "Website Vulnerability Detection: Inception of Mitigation of Advanced Persistent Threats." Solid State Technology 63, no. 6 (2020): 7902. https://doi.org/10.5281/zenodo.7549581.
Full textAkpan Itoro Udofot, Akpan Itoro Udofot, Omotosho Moses Oluseyi Omotosho Moses Oluseyi, and Edim Bassey Edim Edim Bassey Edim. "A Deep Learning Approach to Detecting Advanced Persistent Threats in Cybersecurity." International Journal of Advances in Engineering and Management 06, no. 12 (2024): 204–13. https://doi.org/10.35629/5252-0612204213.
Full textKumrashan, Indranil Iyer. "Proactive Threat Hunting: Leveraging AI for Early Detection of Advanced Persistent Threats." European Journal of Advances in Engineering and Technology 11, no. 2 (2024): 69–76. https://doi.org/10.5281/zenodo.15260469.
Full textWang, Luoli. "A spatial-temporal correlation based method for advanced persistent threat detection." Journal of Physics: Conference Series 2113, no. 1 (2021): 012037. http://dx.doi.org/10.1088/1742-6596/2113/1/012037.
Full textOughannou, Zahra, Zakaria El Rhadiouini, Habiba Chaoui, and Salmane Bourekkadi. "Anomaly-Based Intrusion Detection System To Detect Advanced Persistent Threats: Environmental Sustainability." E3S Web of Conferences 412 (2023): 01106. http://dx.doi.org/10.1051/e3sconf/202341201106.
Full textSarkunavathi, A., and V. Srinivasan. "A Detailed Study on Advanced Persistent Threats: A Sophisticated Threat." Asian Journal of Computer Science and Technology 7, S1 (2018): 90–95. http://dx.doi.org/10.51983/ajcst-2018.7.s1.1797.
Full textHagen, Raymond André, and Kirsi Helkala. "Complexity of Contemporary Indicators of Compromise." European Conference on Cyber Warfare and Security 23, no. 1 (2024): 697–707. http://dx.doi.org/10.34190/eccws.23.1.2149.
Full textMoya, Juan Ramón, Noemí DeCastro-García, Ramón-Ángel Fernández-Díaz, and Jorge Lorenzana Tamargo. "Expert knowledge and data analysis for detecting advanced persistent threats." Open Mathematics 15, no. 1 (2017): 1108–22. http://dx.doi.org/10.1515/math-2017-0094.
Full textNursari, Dessi. "North Korean Threat Perceptions in Advanced Persistent Threat (APT) Operations in Global Cyberspace." Dinasti International Journal of Education Management And Social Science 6, no. 4 (2025): 3370–79. https://doi.org/10.38035/dijemss.v6i4.4665.
Full textKarabacak, Bilge, and Todd Whittaker. "Zero Trust and Advanced Persistent Threats: Who Will Win the War?" International Conference on Cyber Warfare and Security 17, no. 1 (2022): 92–101. http://dx.doi.org/10.34190/iccws.17.1.10.
Full textHagen, Raymond André. "Computational Forensics: The Essential Role of Logs in APT and Advanced Cyberattack Response." International Conference on Cyber Warfare and Security 20, no. 1 (2025): 547–54. https://doi.org/10.34190/iccws.20.1.3328.
Full textNagendrababu NC, Samyama Gunjal GH, and Himabindhu N. "Advance persistent threat prediction using knowledge graph." International Journal of Science and Technology Research Archive 6, no. 2 (2024): 071–82. http://dx.doi.org/10.53771/ijstra.2024.6.2.0047.
Full textChakkaravarthy, S. Sibi, V. Vaidehi, and P. Rajesh. "Hybrid Analysis Technique to detect Advanced Persistent Threats." International Journal of Intelligent Information Technologies 14, no. 2 (2018): 59–76. http://dx.doi.org/10.4018/ijiit.2018040104.
Full textRay, Loye L., and Henry Felch. "Methodology for Detecting Advanced Persistent Threats in Oracle Databases." International Journal of Strategic Information Technology and Applications 5, no. 1 (2014): 42–53. http://dx.doi.org/10.4018/ijsita.2014010104.
Full textAswathi, Radhakrishnan K. M. "Machine Learning based Advanced Persistent Threat Attack Detection System." Recent Innovations in Wireless Network Security 5, no. 3 (2023): 22–30. https://doi.org/10.5281/zenodo.8268062.
Full textAbdullateef Barakat. "Enhancing global cybersecurity: Strategies for mitigating advanced persistent threats (APTS) in a borderless digital landscape." World Journal of Advanced Research and Reviews 25, no. 3 (2025): 829–46. https://doi.org/10.30574/wjarr.2025.25.3.0815.
Full textHallaji, Ehsan, Roozbeh Razavi-Far, and Mehrdad Saif. "Robust Federated Learning for Mitigating Advanced Persistent Threats in Cyber-Physical Systems." Applied Sciences 14, no. 19 (2024): 8840. http://dx.doi.org/10.3390/app14198840.
Full textMathew, Alex. "Threat Defense through Cyber Fusion." International Journal of Computer Science and Mobile Computing 12, no. 1 (2023): 24–27. http://dx.doi.org/10.47760/ijcsmc.2022.v12i01.003.
Full textWibowo, Budi, Aji Nurrohman, and Luqman Hafiz. "Deep Learning in Wazuh Intrusion Detection System to Identify Advanced Persistent Threat (APT) Attacks." International Journal of Science Education and Cultural Studies 4, no. 1 (2025): 1–10. https://doi.org/10.58291/ijsecs.v4i1.311.
Full textYan, Guanghua, Qiang Li, Dong Guo, and Bing Li. "AULD: Large Scale Suspicious DNS Activities Detection via Unsupervised Learning in Advanced Persistent Threats." Sensors 19, no. 14 (2019): 3180. http://dx.doi.org/10.3390/s19143180.
Full textLi, Wentao. "A Comparative Analysis of Advanced Persistent Threat Detection Methodologies: A Systematic Review." Applied and Computational Engineering 165, no. 1 (2025): 102–8. https://doi.org/10.54254/2755-2721/2025.ld24900.
Full textJang, Seok-Woo, and Yong-Joon Lee. "A Study on the APT Attack Scenario Verification System." Journal of the Korea Academia-Industrial cooperation Society 24, no. 4 (2023): 610–15. http://dx.doi.org/10.5762/kais.2023.24.4.610.
Full textOnome, Dr Oghene Augustine. "Advanced Cyber Exploitation and Mitigation Methodology." International Journal of Emerging Science and Engineering 10, no. 4 (2022): 8–15. http://dx.doi.org/10.35940/ijese.c2525.0310422.
Full textDr., Oghene Augustine Onome. "Advanced Cyber Exploitation and Mitigation Methodology." International Journal of Emerging Science and Engineering (IJESE) 10, no. 4 (2022): 8–15. https://doi.org/10.35940/ijese.C2525.0310422.
Full textShaik Mabu Basha, Banala Laxmi Venkata Sai Akhil, Boya Akhil, Rajala Madhusudhan Reddy, and Dr. Tippanna. "Defensive Deception Based on Hyper Game Theory against Advanced Persistent Threats." International Journal of Scientific Research in Science, Engineering and Technology 12, no. 3 (2025): 65–71. https://doi.org/10.32628/ijsrset2512314.
Full textChu, Wen-Lin, Chih-Jer Lin, and Ke-Neng Chang. "Detection and Classification of Advanced Persistent Threats and Attacks Using the Support Vector Machine." Applied Sciences 9, no. 21 (2019): 4579. http://dx.doi.org/10.3390/app9214579.
Full textChen, Gang, Chu Le Yang, Jun Yang, and Jun Ping Cai. "Research on APT and its Secrutiy Protection." Advanced Materials Research 989-994 (July 2014): 4970–73. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4970.
Full textLapsar, Aleksey, Sergey Nazaryan, and Alisa Vladimirova. "Ensuring the Resistance of Critical Information Infrastructure Objects to Advanced Persistent Threats." Voprosy kiberbezopasnosti, no. 2(48) (2022): 39–51. http://dx.doi.org/10.21681/2311-3456-2022-2-39-51.
Full textSugumar, R. Sugumar. "Cross-Layer Threat Detection Framework For Multi-Domain Apts Using Network Telemetry And Data Mining." Mathematical Statistician and Engineering Applications 71, no. 4 (2022): 16888–93. https://doi.org/10.17762/msea.v71i4.2986.
Full textNicho, Mathew, Christopher D. McDermott, Hussein Fakhry, and Shini Girija. "A System Dynamics Approach to Evaluate Advanced Persistent Threat Vectors." International Journal of Information Security and Privacy 17, no. 1 (2023): 1–23. http://dx.doi.org/10.4018/ijisp.324064.
Full textGan, Chenquan, Jiabin Lin, Da-Wen Huang, Qingyi Zhu, and Liang Tian. "Advanced Persistent Threats and Their Defense Methods in Industrial Internet of Things: A Survey." Mathematics 11, no. 14 (2023): 3115. http://dx.doi.org/10.3390/math11143115.
Full textLi, Pengdeng, Xiaofan Yang, Qingyu Xiong, Junhao Wen, and Yuan Yan Tang. "Defending against the Advanced Persistent Threat: An Optimal Control Approach." Security and Communication Networks 2018 (2018): 1–14. http://dx.doi.org/10.1155/2018/2975376.
Full textWang, Lian Hai, and Qiu Liang Xu. "An APT Trojan Detection Method Based on Memory Forensics Techniques." Applied Mechanics and Materials 701-702 (December 2014): 927–34. http://dx.doi.org/10.4028/www.scientific.net/amm.701-702.927.
Full textShakil, Farhan, Sadia Afrin, Abdullah Al Mamun, et al. "HYBRID MULTI-MODAL DETECTION FRAMEWORK FOR ADVANCED PERSISTENT THREATS IN CORPORATE NETWORKS USING MACHINE LEARNING AND DEEP LEARNING." International Journal of Computer Science & Information System 10, no. 02 (2025): 6–20. https://doi.org/10.55640/ijcsis/volume10issue02-02.
Full textJabar, Thulfiqar, and Manmeet Mahinderjit Singh. "Exploration of Mobile Device Behavior for Mitigating Advanced Persistent Threats (APT): A Systematic Literature Review and Conceptual Framework." Sensors 22, no. 13 (2022): 4662. http://dx.doi.org/10.3390/s22134662.
Full text