Advanced Persistent Threats Attacks in Cyberspace. Threats, Vulnerabilities, Methods of Protection (original) (raw)

Profile image of Artur  RotArtur Rot

2017, Position Papers of the 2017 Federated Conference on Computer Science and Information Systems

Evidence-Based Detection of Advanced Persistent Threats

Gheorghe Tecuci

Computing in Science & Engineering, 2018

View PDFchevron_right

The Battle Against Security Attacks

Katina Michael

2002

View PDFchevron_right

A concept for strategic cyber defense

Don Faatz

2003

View PDFchevron_right

Protecting against cyber threats in networked information systems

vipin kumar

Battlespace Digitization and Network-Centric Systems III, 2003

View PDFchevron_right

Cyber-Security Threats Origins and their Analysis

Maroš Čergeť

Acta Polytechnica Hungarica, 2022

View PDFchevron_right

A Survey on Computer and Network Security Attacks

Anwar Alzaid

IJARCCE, 2019

View PDFchevron_right

Cyber Security

marvin odhiambo

View PDFchevron_right

Attack surface definitions: A systematic literature review

Mahran Al-Zyoud

Information and Software Technology, 2018

View PDFchevron_right

Computer and Network Security [Working Title]

Jaydip Sen

2019

View PDFchevron_right

Cyberspace and Artificial Intelligence: The New Face of Cyber-Enhanced Hybrid Threats

Carlos Pedro Gonçalves

Cyberspace [Working Title], 2019

View PDFchevron_right

Loading...

Loading Preview

Sorry, preview is currently unavailable. You can download the paper by clicking the button above.

Getting Ahead of the Threat

Richard Strelitz

2008

View PDFchevron_right

Advances in Security in Computing and Communications

MUFTAH FRAIFER

Advances in Security in Computing and Communications

View PDFchevron_right

Int. J. Sci. Res. in Network Security and Communication

Dr. Shivlal Mewada

View PDFchevron_right

Enabling automated threat response through the use of a dynamic security policy

Hervé Debar

Journal in Computer Virology, 2007

View PDFchevron_right

Advanced Persistent Threats Attacks in Cyberspace

Bogusław Olszewski, Artur Rot

2017 Federated Conference on Computer Science and Information Systems, 2017

View PDFchevron_right

Advanced Persistent Threats: The Next Generation Targeted Attacks

Vikram Arsid

View PDFchevron_right

Cyber Terrorism Threat and the Pandemic

Ivana Luknar

2020

View PDFchevron_right

Cybersecurity risk

Serghei A Ohrimenco

2024

View PDFchevron_right

Challenges in Combating the Cyber Crime

ahmet nuredini

Mediterranean Journal of Social Sciences, 2014

View PDFchevron_right

Preface to special issue on the cognitive science of cyber defence analysis

Nancy Cooke

ICST Transactions on Security and Safety, 2013

View PDFchevron_right

Terrorism and Cyber Attacks as Hybrid Threats: Defining a Comprehensive Approach for Countering 21st Century Threats to Global Risk and Security

Professor Sascha-Dominik Dov Bachmann

SSRN Electronic Journal, 2013

View PDFchevron_right

Cyber security: challenges for society-literature review

Kent Zamora

View PDFchevron_right

AI-Driven Cybersecurity: Balancing Advancements and Safeguards

Rakibul Hasan

Journal of computer science and technology studies, 2024

View PDFchevron_right

Security Projects for Systems and Networking Professionals

Hamid Arabnia

Emerging Trends in ICT Security, 2014

View PDFchevron_right

Vulnerability-threats assessment for enterprise network

Aliyu Mohammed

View PDFchevron_right

Cyber Security Management

Dhirodatta Subba

Salesian journal of humanities and social sciences, 2014

View PDFchevron_right

The AI-Cybersecurity Nexus: The Good and the Evil

San Murugesan

IT Professional

View PDFchevron_right

Shifting Security Paradigms. Toward Resilience

Lewis Perelman

View PDFchevron_right

Navigating the Labyrinth: Unraveling Security Threats and Vulnerabilities in Network Infrastructures

Jessie Mahinay

International Journal of Advanced Research in Science, Communication and Technology, 2023

View PDFchevron_right

Network vulnerability to single, multiple, and probabilistic physical attacks

Alon Efrat

2010

View PDFchevron_right

University of Groningen Threat by association

Thijs Bouman

View PDFchevron_right

Cybersecurity Infrastructure and Security Automation

ALEX R MATHEW

Advanced Computing: An International Journal

View PDFchevron_right

Computational Intelligence, Cyber Security and Computational Models

Vijayalakshmi Ramasamy

Advances in Intelligent Systems and Computing, 2014

View PDFchevron_right

From Security Protocols to Systems Security

Brian Monahan

Lecture Notes in Computer Science, 2005

View PDFchevron_right

Unified Preventive and Reactive Cyber Defense Dynamics Is Still Globally Convergent

Shouhuai Xu

IEEE/ACM Transactions on Networking

View PDFchevron_right

Computer ScienceInformation SecurityCyberspaceCyberwarfareCybersecurityAdvanced Persistent ThreatsCyber SecuritySecurity Risk ManagementThreats