메뉴 건너뛰기




Volumn 11098 LNCS, Issue , 2018, Pages 555-574

Tracking advanced persistent threats in critical infrastructures through opinion dynamics

Author keywords

Advanced persistent threat; Detection; Opinion dynamics; Traceability

Indexed keywords

DYNAMICS; ERROR DETECTION; PUBLIC WORKS; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 85052214158     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-99073-6_27     Document Type: Conference Paper
Times cited : (13)

References (19)
  • 1
    • 84962499012 scopus 로고    scopus 로고
    • Cyber stealth attacks in critical information infrastructures
    • Cazorla, L., Alcaraz, C., Lopez, J.: Cyber stealth attacks in critical information infrastructures. IEEE Syst. J. 12(2), 1778–1792 (2018)
    • (2018) IEEE Syst. J. , vol.12 , Issue.2 , pp. 1778-1792
    • Cazorla, L.1    Alcaraz, C.2    Lopez, J.3
  • 2
    • 84986247560 scopus 로고    scopus 로고
    • A comprehensive study on apt attacks countermeasures for future networks communications: Challenges solutions
    • Singh, S., Sharma, P.K., Moon, S.Y., Moon, D., Park, J.H.: A comprehensive study on apt attacks countermeasures for future networks communications: challenges solutions. J. Supercomput. 1–32 (2016). https://doi.org/10.1007/s11227-016-1850-4
    • (2016) J. Supercomput. , vol.1 , pp. 32
    • Singh, S.1    Sharma, P.K.2    Moon, S.Y.3    Moon, D.4    Park, J.H.5
  • 3
    • 85029509042 scopus 로고    scopus 로고
    • Preventing advanced persistent threats in complex control networks
    • Foley, S.N., Gollmann, D., Snekkenes, E. (eds.), Springer, Cham
    • Rubio, J.E., Alcaraz, C., Lopez, J.: Preventing advanced persistent threats in complex control networks. In: Foley, S.N., Gollmann, D., Snekkenes, E. (eds.) ESORICS 2017. LNCS, vol. 10493, pp. 402–418. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-66399-9 22
    • (2017) ESORICS 2017. LNCS , vol.10493 , pp. 402-418
    • Rubio, J.E.1    Alcaraz, C.2    Lopez, J.3
  • 4
    • 0016072062 scopus 로고
    • Structural controllability
    • Lin, C.-T.: Structural controllability. IEEE Trans. Autom. Control 19(3), 201–208 (1974)
    • (1974) IEEE Trans. Autom. Control , vol.19 , Issue.3 , pp. 201-208
    • Lin, C.-T.1
  • 7
    • 84875705321 scopus 로고    scopus 로고
    • The power grid as a complex network: A survey
    • Pagani, G.A., Aiello, M.: The power grid as a complex network: a survey. Phys. A: Stat. Mech. Appl. 392(11), 2688–2700 (2013)
    • (2013) Phys. A: Stat. Mech. Appl. , vol.392 , Issue.11 , pp. 2688-2700
    • Pagani, G.A.1    Aiello, M.2
  • 8
    • 0032482432 scopus 로고    scopus 로고
    • Collective dynamics of ‘small-world’ networks
    • Watts, D.J., Strogatz, S.H.: Collective dynamics of ‘small-world’ networks. Nature 393(6684), 440 (1998)
    • (1998) Nature , vol.393 , Issue.6684 , pp. 440
    • Watts, D.J.1    Strogatz, S.H.2
  • 9
    • 0011697225 scopus 로고    scopus 로고
    • Opinion dynamics and bounded confidence models, analysis, and simulation
    • Hegselmann, R., Krause, U., et al.: Opinion dynamics and bounded confidence models, analysis, and simulation. J. Artif. Soc. Soc. Simul. 5(3), 1–33 (2002)
    • (2002) J. Artif. Soc. Soc. Simul. , vol.5 , Issue.3 , pp. 1-33
    • Hegselmann, R.1    Krause, U.2
  • 10
    • 85029364817 scopus 로고    scopus 로고
    • Survey of publicly available reports on advanced persistent threat actors
    • Lemay, A., Calvet, J., Menet, F., Fernandez, J.M.: Survey of publicly available reports on advanced persistent threat actors. Comput. Secur. 72, 26–59 (2018)
    • (2018) Comput. Secur. , vol.72 , pp. 26-59
    • Lemay, A.1    Calvet, J.2    Menet, F.3    Fernandez, J.M.4
  • 15
    • 85052244318 scopus 로고    scopus 로고
    • Accessed Apr 2018
    • MITRE Corporation. MITRE ATT&CK (2018). https://attack.mitre.org. Accessed Apr 2018
    • MITRE ATT&CK (2018
  • 16
    • 84907351844 scopus 로고    scopus 로고
    • A study on advanced persistent threats
    • Decker, B., Zúquete, A. (eds.), Springer, Heidelberg
    • Chen, P., Desmet, L., Huygens, C.: A study on advanced persistent threats. In: De Decker, B., Zúquete, A. (eds.) CMS 2014. LNCS, vol. 8735, pp. 63–72. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-44885-4_5
    • (2014) CMS 2014. LNCS , vol.8735 , pp. 63-72
    • Chen, P.1    Desmet, L.2    Huygens, C.3
  • 17
    • 84905692209 scopus 로고    scopus 로고
    • Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains
    • Hutchins, E.M., Cloppert, M.J., Amin, R.M.: Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. Lead. Issues Inf. Warf. Secur. Res. 1(1), 80 (2011)
    • (2011) Lead. Issues Inf. Warf. Secur. Res. , vol.1 , Issue.1 , pp. 80
    • Hutchins, E.M.1    Cloppert, M.J.2    Amin, R.M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.