Search
Search Results
-
Two-stage advanced persistent threat (APT) attack on an IEC 61850 power grid substation
Advanced Persistent Threats (APTs) are stealthy, multi-step attacks tailored to a specific target. Often described as ’low and slow’, APTs remain...
-
Advanced Persistent Threat Identification with Boosting and Explainable AI
Advanced persistent threat (APT) is a serious concern in cyber-security that has matured and grown over the years with the advent of technology. The...
-
APT-Dt-KC: advanced persistent threat detection based on kill-chain model
Advanced persistent threat attacks are considered as a serious risk to almost any infrastructure since attackers are constantly changing and evolving...
-
Modeling advanced persistent threats using risk matrix methods
The aim of the study is to assess the security of information systems during an influence of advanced persistent threats. The article shows the need...
-
An efficient eavesdrop** model for detection of advanced persistent threat (APT) in high volume network traffic
Eavesdrop**, commonly referred to as network analysis, is the process of gathering data traffic. To check if attackers are sneaking into a network,...
-
Persistent MobileApp-in-the-Middle (MAitM) attack
The recent publication of the “Browser in the Middle” attack has demonstrated an effective way to compromise a good number of variants of Multifactor...
-
XFedGraph-Hunter: An Interpretable Federated Learning Framework for Hunting Advanced Persistent Threat in Provenance Graph
Advanced persistent threats (APT) are increasingly sophisticated and pose a significant threat to organizations’ cybersecurity. Detecting APT attacks... -
Accurify: Automated New Testflows Generation for Attack Variants in Threat Hunting
In the ever-evolving landscape of cyber security, threat hunting has emerged as a proactive defense line to detect advanced threats. To evade... -
-
Detection of advanced persistent threats using hashing and graph-based learning on streaming data
Many activities in the cybersecurity realm can be represented using graphs stream, such as call graphs. In this paper, we introduce an innovative...
-
An Attack Entity Deducing Model for Attack Forensics
The forensics of Advanced Persistent Threat (APT) attacks, known for their prolonged duration and utilization of multiple attack methods, require... -
Synthetic Network Traffic Data Generation and Classification of Advanced Persistent Threat Samples: A Case Study with GANs and XGBoost
The need to develop more efficient network traffic data generation techniques that can reproduce the intricate features of traffic flows forms a... -
Threat Actors and Methods of Attack to Social Robots in Public Spaces
The use of social robots in critical domains such as education and healthcare, as well as in public spaces, raises important challenges in ethics,... -
Analyzing Advanced Persistent Threats Using Game Theory: A Critical Literature Review
Advanced persistent threats present significant security challenges due to their customized, stealthy and adaptive nature. Since no generic solution... -
Threats and Threat Intelligence
Digital technologies used in digital transformation are essential for every industrial, public, and private organization. In industry, the automation... -
Cyber threat assessment and management for securing healthcare ecosystems using natural language processing
The healthcare sectors have constantly faced significant challenge due to the rapid rise of cyber threats. These threats can pose any potential risk...
-
Comparative Analysis of Reduction Methods on Provenance Graphs for APT Attack Detection
Data reduction is a critical aspect of current research in advanced persistent threat attack detection. The challenge is handling the huge amount of... -
Identifying Tactics of Advanced Persistent Threats with Limited Attack Traces
The cyberworld being threatened by continuous imposters needs the development of intelligent methods for identifying threats while kee** in mind... -
An autoML network traffic analyzer for cyber threat detection
Timely detection and effective treatment of cyber-attacks for protecting personal and sensitive data from unauthorized disclosure constitute a core...
-
Threat Landscape
Maintaining a high awareness level is beneficial and essential in cybersecurity’s intricate and ever-evolving realm. This critical aspect is the...