The Advanced Persistent Threat, USENIX (ed.) 23rd Large Installation System Administration Conference. USENIX, 2009. ,
Sherlock Holmes and The Case of the Advanced Persistent Threat, Proceedings of the 5th USENIX conference on Large-Scale Exploits and Emergent Threats, pp.2-2, 2012. ,
Persistent and Evasive Attacks Uncovered, Infosecurity, vol.8, issue.5, pp.40-43, 2011. ,
DOI : 10.1016/S1754-4548(11)70069-9
N-Victims: An Approach to Determine N-Victims for APT Investigations, Lecture Notes in Computer Science, vol.7690, pp.226-240, 2012. ,
DOI : 10.1007/978-3-642-35416-8_16
http://www.sans.org/reading_room/whitepapers/malicious/detailed-analysis- advanced-persistent-threat-malware_33814 ,
Evidence of Advanced Persistent Threat: A case study of malware for political espionage, 2011 6th International Conference on Malicious and Unwanted Software, pp.102-109, 2011. ,
DOI : 10.1109/MALWARE.2011.6112333
Retrospective Detection of Malware Attacks by Cloud Computing, International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, pp.510-517, 2010. ,
Rishi: identify bot contaminated hosts by IRC nickname evaluation, Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets, pp.8-8, 2007. ,
Efficient Detection of Bots in Subscribers' Computers, 2009 IEEE International Conference on Communications, pp.1-6, 2009. ,
DOI : 10.1109/ICC.2009.5198970
Botzilla, Proceedings of the 2010 ACM Symposium on Applied Computing, SAC '10, pp.1978-1984, 2010. ,
DOI : 10.1145/1774088.1774506
Detection of web based command & control channels, Mathematics and Computer Science. University of TWENTE, 2011. ,
Behavioral clustering of HTTP-based malware and signature generation using malicious network traces, Proceedings of the 7th USENIX conference on Networked systems design and implementation, pp.26-26, 2010. ,
BotSniffer: Detecting botnet command and control channels in network traffic, Proceedings of the 15th Annual Network and Distributed System Security Symposium, 2008. ,
CCSP: Cisco Certified Security Professional Certification All-in-One Exam Guide, 2003. ,
Industrial Espionage and Targeted Attacks: Understanding the Characteristics of an Escalating Threat, Lecture Notes in Computer Science, vol.7462, pp.64-85, 2012. ,
DOI : 10.1007/978-3-642-33338-5_4
Targeted Cyber Attacks - A Superset of Advanced Persistent Threats, IEEE Security & Privacy Magazine, vol.99, pp.1-3, 2012. ,
DOI : 10.1109/MSP.2012.90
Cybercrime: Dissecting the State of Underground Enterprise, IEEE Internet Computing, vol.17, issue.1, pp.1-1, 2012. ,
DOI : 10.1109/MIC.2012.61
Developing Secure Products in the Age of Advanced Persistent Threats, IEEE Security & Privacy Magazine, vol.10, issue.3, pp.88-92, 2012. ,
DOI : 10.1109/MSP.2012.65
Advanced Persistent threats and how to monitor and deter them, Network Security, vol.2011, issue.8, pp.16-19, 2011. ,
DOI : 10.1016/S1353-4858(11)70086-1
APTs: a poorly understood challenge, Network Security, vol.2011, pp.9-11, 2011. ,
MapReduce, Communications of the ACM, vol.51, issue.1, pp.107-113, 2008. ,
DOI : 10.1145/1327452.1327492