Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "Evolving Systems"
DOI: 10.1007/s12530-020-09335-4
Abstract: In recent years, the use of information technologies in Critical Infrastructures is gradually increasing. Although this brings benefits, it also increases the possibility of security attacks. Despite the availability of various advanced incident handling techniques…
read more here.
Keywords:
persistent threats;
handling advanced;
threats complex;
incidents healthcare ... See more keywords
Photo from academic.microsoft.com
Sign Up to like & get
recommendations!
1
Published in 2021 at "Connection Science"
DOI: 10.1080/09540091.2020.1832960
Abstract: The expansion of information technology infrastructure is encountered with Advanced Persistent Threats (APTs), which can launch data destruction, disclosure, modification, and/or Denial of Service attacks by drawing upon vulnerabilities of software and hardware. Moving Target…
read more here.
Keywords:
persistent threats;
defense;
adaptive defense;
advanced persistent ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2017 at "IEEE Access"
DOI: 10.1109/access.2017.2691326
Abstract: Advanced Persistent Threats (APTs) represent stealthy, powerful, long-term, and well-funded attacks against cyber systems, such as data centers and cloud storage. Evolutionary game theory is used to capture the long-term continuous behavior of the APTs…
read more here.
Keywords:
storage;
persistent threats;
game;
evolutionary game ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2021 at "IEEE Transactions on Cloud Computing"
DOI: 10.1109/tcc.2019.2896632
Abstract: Fog computing has gained tremendous popularity due to its capability of addressing the surging demand on high-quality ubiquitous mobile services. Nevertheless, the highly virtualized environment in fog computing leads to vulnerability to cyber attacks such…
read more here.
Keywords:
cyber;
persistent threats;
advanced persistent;
fog computing ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2022.3229595
Abstract: Advanced persistent threats (APTs) are one of today’s major threats to cyber security. Highly determined attackers along with novel and evasive exfiltration techniques mean APT attacks elude most intrusion detection and prevention systems. The result…
read more here.
Keywords:
information;
persistent threats;
advanced persistent;
game ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE Transactions on Industrial Informatics"
DOI: 10.1109/tii.2019.2925035
Abstract: In this paper, the security problem for a cloud control system (CCS) is studied. In the CCS, so-called advanced persistent threats (APTs) can be launched by a malicious attacker to reduce the quality of service…
read more here.
Keywords:
persistent threats;
system;
stackelberg game;
control system ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2017 at "PLoS ONE"
DOI: 10.1371/journal.pone.0168675
Abstract: Advanced persistent threats (APT) combine a variety of different attack forms ranging from social engineering to technical exploits. The diversity and usual stealthiness of APT turns them into a central problem of contemporary practical system…
read more here.
Keywords:
game;
persistent threats;
system;
advanced persistent ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2017 at "Open Mathematics"
DOI: 10.1515/math-2017-0094
Abstract: Abstract Critical Infrastructures in public administration would be compromised by Advanced Persistent Threats (APT) which today constitute one of the most sophisticated ways of stealing information. This paper presents an effective, learning based tool that…
read more here.
Keywords:
persistent threats;
knowledge data;
data analysis;
expert knowledge ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2020 at "Studies in Informatics and Control"
DOI: 10.24846/v29i3y202001
Abstract: Large CSOCs (cybersecurity operation centers) must analyze tens of thousands of security incidents per day. Not only that there are not enough cybersecurity analysts available but the average cost of a cybersecurity analyst keeps going…
read more here.
Keywords:
complementary approaches;
persistent threats;
cybersecurity;
advanced persistent ... See more keywords