메뉴 건너뛰기




Volumn , Issue , 2012, Pages 69-74

A context-based detection framework for advanced persistent threats

Author keywords

APT; Security

Indexed keywords

CONTEXT-BASED; CYBER THREATS; DETECTION FRAMEWORK; DETECTION PROBLEMS; ORGANIZATION NETWORKS; SECURITY;

EID: 84881032625     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CyberSecurity.2012.16     Document Type: Conference Paper
Times cited : (98)

References (11)
  • 2
    • 78650900359 scopus 로고    scopus 로고
    • Capability of the People's Republic of China to conduct cyber warfare and computer network exploitation
    • Washington, DC, Research Report
    • B. Krekel, G. Bakos, and C. Barnett, "Capability of the People's Republic of China to conduct cyber warfare and computer network exploitation," The US-China Economic and Security Review Commission, Washington, DC, Research Report, 2009.
    • (2009) The US-China Economic and Security Review Commission
    • Krekel, B.1    Bakos, G.2    Barnett, C.3
  • 4
    • 77952903083 scopus 로고    scopus 로고
    • July
    • Verizon, "2010 Data Breach Investigations Report," http://newscenter.verizon.com/press-releases/verizon/2010/2010-data-breach- report-from.html, July 2010.
    • (2010) 2010 Data Breach Investigations Report
  • 7
    • 0002670359 scopus 로고    scopus 로고
    • Attack trees-modeling security threats
    • December
    • B. Schneier, "Attack Trees - Modeling Security Threats," Dr. Dobb's Journal, December 1999.
    • (1999) Dr. Dobb's Journal
    • Schneier, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.