-
1
APT attack threat-hunting network model based on hypergraph Transformer
Published 2024-02-01Subjects: “…advanced persistent threat…”
Get full text
Article -
2
Security Cballenges Facing Our Country and Countermeasure Recommendations Under New Network Security Tbreats
Published 2014-07-01Subjects: “…advanced persistent threat…”
Get full text
Article -
3
Evaluation of mimic defense strategy based on M-FlipIt game model
Published 2020-07-01Subjects: Get full text
Article -
4
Analysis of software defined security model and architecture
Published 2017-06-01Subjects: Get full text
Article -
5
Research on entity recognition and alignment of APT attack based on Bert and BiLSTM-CRF
Published 2022-06-01Subjects: “…advanced persistent threat…”
Get full text
Article -
6
Review of threat discovery and forensic analysis based on system provenance graph
Published 2022-07-01Subjects: Get full text
Article -
7
Survey of software anomaly detection based on deception
Published 2022-02-01Subjects: “…advanced persistent threat…”
Get full text
Article -
8
APT Adversarial Defence Mechanism for Industrial IoT Enabled Cyber-Physical System
Published 2023-01-01Subjects: “…Advanced persistent threat…”
Get full text
Article