A novel deep learning stack for APT detection

T Bodström, T Hämäläinen - Applied Sciences, 2019 - mdpi.com
We present a novel Deep Learning (DL) stack for detecting Advanced Persistent threat
(APT) attacks. This model is based on a theoretical approach where an APT is observed as …

[PDF][PDF] Modelling serous games for enhancing end user cyber security awareness

M Nicho - IADIS Int. J. Comput. Sci. Inf. Syst, 2017 - academia.edu
The objective of this paper is to present a serious games model that assist organizations to
substantially enhance computer user's cyber security awareness. Extensive research into …

Security Algorithms to Detect and Prevent Advanced Persistent Threats in Cloud Computing: A Systematic Review

L Mashimbye, TE Mathonsi… - … Computer and Energy …, 2023 - ieeexplore.ieee.org
Cloud computing simplifies and improves access to data and services for organizations and
individuals. The number of users and data in cloud computing increases, making it more …

[PDF][PDF] Gam-Apt: A Serious Game Attribute Taxonomy for Advanced Persistent Threats

M Nicho - section V, 2020 - scholar.archive.org
Serious games find immense applications in the domain of education, information systems
and information security due to convenience of time, instant feedback, attractiveness and the …

A Bio-immunology Inspired Industrial Control System Security Model

M Chitauro, H Muyingi, S John, S Chitauro - First International Conference …, 2020 - Springer
Abstract Industrial Control System (ICS) security is inadequate to protect ICS from Advanced
Persistent Threats (APT). APTs attack ICS in such a way that they are detected after a long …

[PDF][PDF] A study on effective outer document flow based on dast for APT response

JP Kim, O Na, H Yu, G Hong, H Chang - 革新的コンピューティング・情報 …, 2020 - icicel.org
The Advanced Persistent Threat (APT) is a method of social engineering which refers to a
meticulous attack by utilizing a precise attack target and sophisticated program and is also …

A Survey of APT Defence Techniques

M Chitauro, H Muyingi, S John… - ICCWS 2019 14th …, 2019 - books.google.com
Since the discovery of Stuxnet in 2010, there have been a plethora of Advanced Persistent
Threats (APT) that have been discovered in regular IT networks and in critical infrastructure …

[引用][C] 基于图算法的APT 攻击检测

李斯祺, 李艳斐 - 网络空间安全, 2020