Discovering Suspicious APT Families Through a Large-Scale Domain Graph in Information-Centric IoT
In recent years, a type of cyberattacks, known as advanced persistent threats, has resulted in very serious losses to various organizations such as governments and enterprises. The APT has the characteristics of long duration, complex attack means, and strong ability to conceal themselves, which mak...
Main Authors: | Zhen Ma, Qiang Li, Xiangyu Meng |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2019-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8624251/ |
Similar Items
-
Discovering Suspicious APT Behaviors by Analyzing DNS Activities
by: Guanghua Yan, et al.
Published: (2020-01-01) -
Cyber Situation Comprehension for IoT Systems based on APT Alerts and Logs Correlation
by: Xiang Cheng, et al.
Published: (2019-09-01) -
The functional significance of the alternative first exons of the Arabidopsis thaliana APT1 gene
by: Facciuolo, Antonio
Published: (2009) -
Nesting a city input–output table in a multiregional framework: a case example with the city of Bogota
by: Fabio Monsalve, et al.
Published: (2020-02-01) -
Influence of Electron-Phonon Coupling Strength on the Superconductivity in APt3P (A = Sr, Ca, La) Compounds
by: Morooka, Eiakihonroeda
Published: (2015)