A survey on advanced persistent threats: Techniques, solutions, challenges, and research opportunities
Threats that have been primarily targeting nation states and their associated entities have
expanded the target zone to include the private and corporate sectors. This class of threats …
expanded the target zone to include the private and corporate sectors. This class of threats …
A survey on malware analysis and mitigation techniques
In recent days, malwares are advanced, sophisticatedly engineered to attack the target. Most
of such advanced malwares are highly persistent and capable of escaping from the security …
of such advanced malwares are highly persistent and capable of escaping from the security …
Modeling realistic adversarial attacks against network intrusion detection systems
The incremental diffusion of machine learning algorithms in supporting cybersecurity is
creating novel defensive opportunities but also new types of risks. Multiple researches have …
creating novel defensive opportunities but also new types of risks. Multiple researches have …
Cybersecurity in big data era: From securing big data to data-driven security
''Knowledge is power” is an old adage that has been found to be true in today's information
age. Knowledge is derived from having access to information. The ability to gather …
age. Knowledge is derived from having access to information. The ability to gather …
DAPT 2020-constructing a benchmark dataset for advanced persistent threats
Abstract Machine learning is being embraced by information security researchers and
organizations alike for its potential in detecting attacks that an organization faces …
organizations alike for its potential in detecting attacks that an organization faces …
Modeling and detection of the multi-stages of Advanced Persistent Threats attacks based on semi-supervised learning and complex networks characteristics
A Zimba, H Chen, Z Wang, M Chishimba - Future Generation Computer …, 2020 - Elsevier
Abstract Advanced Persistent Threats (APT) present the most sophisticated types of attacks
to modern networks which have proved to be very challenging to address. Using …
to modern networks which have proved to be very challenging to address. Using …
The challenges of leveraging threat intelligence to stop data breaches
Despite the significant increase in cybersecurity solutions investment, organizations are still
plagued by security breaches, especially data breaches. As more organizations experience …
plagued by security breaches, especially data breaches. As more organizations experience …
APT beaconing detection: A systematic review
Abstract Advanced Persistent Threat (APT) is a type of threat that has grabbed the attention
of researchers, particularly in the industrial security field. APTs are cyber intrusions carried …
of researchers, particularly in the industrial security field. APTs are cyber intrusions carried …
Hidden markov model and cyber deception for the prevention of adversarial lateral movement
Advanced persistent threats (APTs) have emerged as multi-stage attacks that have targeted
nation-states and their associated entities, including private and corporate sectors. Cyber …
nation-states and their associated entities, including private and corporate sectors. Cyber …
Holistic security and safety for factories of the future
The accelerating transition of traditional industrial processes towards fully automated and
intelligent manufacturing is being witnessed in almost all segments. This major adoption of …
intelligent manufacturing is being witnessed in almost all segments. This major adoption of …