Machine learning-enabled iot security: Open issues and challenges under advanced persistent threats

Z Chen, J Liu, Y Shen, M Simsek, B Kantarci… - ACM Computing …, 2022 - dl.acm.org
Despite its technological benefits, the Internet of Things (IoT) has cyber weaknesses due to
vulnerabilities in the wireless medium. Machine Larning (ML)-based methods are widely …

A survey of advanced persistent threats attack and defense

Y Mei, W Han, S Li, X Wu - 2021 IEEE Sixth International …, 2021 - ieeexplore.ieee.org
Advanced Persistent Threats (APT) are a complex attack method aimed at specific targets to
steal high-value sensitive information or damage the target organization's infrastructure. The …

[图书][B] Advanced Persistent Threats in Cybersecurity–Cyber Warfare

N Sfetcu - 2024 - books.google.com
This book aims to provide a comprehensive analysis of Advanced Persistent Threats (APTs),
including their characteristics, origins, methods, consequences, and defense strategies, with …

Systems Dynamics Modeling for Evaluating Socio-Technical Vulnerabilities in Advanced Persistent Threats

M Nicho, S Girija - 2022 15th International Conference on …, 2022 - ieeexplore.ieee.org
The paper focus on the application of Systems Dynamics Modelling (SDM) for simulating
socio-technical vulnerabilities of Advanced Persistent Threats (APT) to unravel Human …

A hybrid multi-criteria decision-making and system dynamics approach in vulnerability analysis of TNI-POLRI power

B Yulianto, I Sudjatmiko, A Octavian… - Decision Science …, 2022 - m.growingscience.com
This study analyzes the vulnerability of the power relations between the Indonesian National
Armed Forces and the Indonesian National Police (TNI-Polri power relations) post-1998 …

[PDF][PDF] Modelling serous games for enhancing end user cyber security awareness

M Nicho - IADIS Int. J. Comput. Sci. Inf. Syst, 2017 - academia.edu
The objective of this paper is to present a serious games model that assist organizations to
substantially enhance computer user's cyber security awareness. Extensive research into …

Cybersecurity incident response against advanced persistent threats (APTs)

A Bhardwaj - Security Incidents & Response Against Cyber Attacks, 2021 - Springer
Recent technological innovations and new age computing models in IT infrastructure have
provided faster bandwidth speeds, cloud computing, mobile computing and virtualization …

A System Dynamics Approach to Evaluate Advanced Persistent Threat Vectors

M Nicho, CD McDermott, H Fakhry… - International Journal of …, 2023 - igi-global.com
Cyber-attacks targeting high-profile entities are focused, persistent, and employ common
vectors with varying levels of sophistication to exploit social-technical vulnerabilities …

[图书][B] Les menaces persistantes avancées en cybersécurité–La guerre cybernétique

N Sfetcu - 2024 - books.google.com
Ce livre vise à fournir une analyse complète des menaces persistantes avancées, y compris
leurs caractéristiques, origines, méthodes, conséquences et stratégies de défense, en …

Machine Learning and Knowledge-Based Integrated Intrusion Detection Schemes

Y Shen - 2022 - ruor.uottawa.ca
As electronic computer technology advances, files and data are kept in computers and
exchanged through networks. The computer is a physically closed system for users, making …