L Xu, ZC Zhao, D Zhao, X Li, X Lu, D Yan - Available at SSRN 4829967 - papers.ssrn.com
In the field of network security, attackers often utilize Advanced Persistent Threats (APT) to
conduct host-based intrusions for prolonged information gathering, penetration and to cause …