Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Research of Snort Rule Extension and APT Detection Based on APT Network Behavior Analysis

    At present, APT attack detection has become the focus of the network security protection field. APT attacks are one of the most difficult attacks in cyber attacks. The complexity and variability of APT attack ...

    Yan Cui, **gfeng Xue, Yong Wang, Zhenyan Liu in Trusted Computing and Information Security (2019)

  2. No Access

    Chapter and Conference Paper

    Machine Learning for Analyzing Malware

    The Internet has become an indispensable part of people’s work and life. It provides favorable communication conditions for malwares. Therefore, malwares are endless and spread faster and become one of the mai...

    Yajie Dong, Zhenyan Liu, Yida Yan, Yong Wang, Tu Peng in Network and System Security (2017)