全部 |
  • 全部
  • 题名
  • 作者
  • 机构
  • 关键词
  • NSTL主题词
  • 摘要
检索 二次检索 AI检索
外文文献 中文文献
筛选条件:

1. Detecting advanced persistent threats via casual graph neural network NSTL国家科技图书文献中心

Zhida Guo |  Xiaoli Li... -  《Fourth International Conference on Network Communication and Information Security (ICNCIS 2024)》 -  International Conference on Network Communication and Information Security - 2025, - 135160Z.1~135160Z.7 - 共7页

摘要:APT attacks are highly dangerous and covert | , making them difficult to detect using conventional |  security measures. Causal analysis based on trace graphs |  has become a common method for APT detection | . However, previous work has encountered several issues
关键词: Advanced persistent threats (APT) |  Trace graphs |  Self-supervised learning |  Graph representation learning |  Anomaly detection

2. Genetic programming for enhanced detection of Advanced Persistent Threats through feature construction NSTL国家科技图书文献中心

Abdullah Al Mamun |  Harith Al-Sahaf... -  《Computers & Security》 - 2025,149(Feb.) - 104185.1~104185.18 - 共18页

摘要:Advanced Persistent Threats (APTs) pose |  considerable challenges in the realm of cybersecurity | , characterized by their evolving tactics and complex evasion |  techniques. These characteristics often outsmart |  traditional security measures and necessitate the
关键词: APT |  Advanced Persistent Threat |  Evolutionary computation |  Feature learning |  Machine learning |  Explainable AI

3. HMS-IDS: Threat Intelligence Integration for Zero-Day Exploits and Advanced Persistent Threats in IIoT NSTL国家科技图书文献中心

Kumar Saurabh |  Vaidik Sharma... -  《Arabian journal for science and engineering》 - 2025,50(2) - 1307~1327 - 共21页

摘要: Persistent Threats (APTs); hence, one of the most prominent |  Unknown-Attacks or Zero-Day Attacks (ZDAs) and Advanced | Critical Industries such as Manufacturing | , Power, and Intelligent Transportation are increasingly |  using IIoT systems, making them more susceptible to
关键词: IIoT |  Intrusion Detection System |  CIC-ToN-IoT |  Cyber-attack |  Zero-DayAttacks

4. Defending Against APT Attacks in Robots: A Multi-phase Game-Theoretical Approach NSTL国家科技图书文献中心

Asim Zoulkarni |  Sai Sandeep Damera... -  《Decision and Game Theory for Security》 -  International Conference on Decision and Game Theory for Security - 2025, - 287~305 - 共19页

摘要:-theoretic framework to model and defend against Advanced |  Persistent Threat (APT) attacks in Autonomous Ground Robots | In this work, we propose a two-phase game |  (AGRs) running a ROS2-based autonomy stack for safety | -critical navigation. In our scenario, the attacker seeks
关键词: Robotics |  Security |  Game theory |  Advanced persistent threats

5. Analyzing Disk-Minimal Malware in Phishing Attacks: A Forensic Methodology for Modern Cyber Threats NSTL国家科技图书文献中心

P Barker |  DA Orr -  《Journal of Information Warfare》 - 2025,24(1) - 82~104 - 共23页

摘要: characterized by advanced methodologies and attacks that |  infrastructures. Among these threats, phishing remains the most | Today's cyber threat landscape is |  inflict monumental damage on educational and financial |  institutions, healthcare systems, and information
关键词: Disk-Minimal malware |  Phishing |  Social engineering |  Advanced persistent threats

6. Feature-driven anomalous behaviour detection and incident classification model for ICS in water treatment plants NSTL国家科技图书文献中心

Gabriela Ahmadi-Assa... |  Haider Al-Khateeb... -  《International journal of electronic security and digital forensics》 - 2025,17(1/2) - 1~29 - 共29页

摘要:Industry 5.0 envisions humans working |  alongside emerging technologies and enabled by the fusion |  of devices and sensors using information and |  communication technologies (ICT) to facilitate process |  automation, monitoring and distributed control in
关键词: critical national infrastructure |  fifth industrial revolution |  operational technology |  smart city |  advanced persistent threats |  APT |  artificial intelligence

7. The APT family classification system based on APT call sequences and attention mechanism NSTL国家科技图书文献中心

Zeng Shou |  Yue-bin Di... -  《International journal of information and computer security》 - 2025,26(1/2) - 22~40 - 共19页

摘要:Advanced persistent threats (APT) pose a major | , these threats leverage sophisticated malware, which |  cybersecurity concern due to their covert nature and targeted |  attacks on enterprises, industries, and national |  infrastructures. Orchestrated by well-organised hacker groups
关键词: APT |  dynamic analysis |  convolutional neural network |  CNN

8. AutoRoC-DBSCAN: automatic tuning of DBSCAN to detect malicious DNS tunnels NSTL国家科技图书文献中心

Thi Quynh Nguyen |  Romain Laborde... -  《Annals of telecommunications》 - 2025,80(3/4) - 227~249 - 共23页 - 被引量:1

摘要:Modern attacks, such as advanced persistent |  threats, hide command-and-control channels inside |  authorized network traffic like DNS or DNS over HTTPS to |  infiltrate the local network and exfiltrate sensitive data | . Detecting such malicious traffic using traditional
关键词: DNS tunneling |  DNS over HTTPS tunneling |  APT |  Unsupervised machine learning |  DBSCAN

9. Entity and relation extractions for threat intelligence knowledge graphs NSTL国家科技图书文献中心

Inoussa Mouiche |  Sherif Saad -  《Computers & Security》 - 2025,148(Jan.) - 104120.1~104120.13 - 共13页

摘要:Advanced persistent threats (APTs) represent a |  maintain a long-term presence. To combat these threats |  and linking cyber threats. These contributions |  complex challenge in cybersecurity as they infiltrate |  networks stealthily to conduct espionage, steal data, and
关键词: Threat intelligence knowledge graphs (TiKG) |  Cyber threat intelligence (CTI) |  Cyber knowledge graphs (CKGs) |  Pipeline extraction |  Joint extraction |  Entity-relation extraction |  Knowledge Ontology |  NER Datasets

10. Enhancing Industrial Cybersecurity: Insights From Analyzing Threat Groups and Strategies in Operational Technology Environments NSTL国家科技图书文献中心

Mukund Bhole |  Thilo Sauter... -  《IEEE Open Journal of the Industrial Electronics Society》 - 2025,6 - 145~157 - 共13页

摘要: vulnerable to advanced persistent threats. This article |  against evolving cyber threats. | In recent years, concepts and components of |  information technology (IT) have made their way into the |  shop floor, today better known as operational
关键词: Security |  Data models |  Cyberattack |  Analytical models |  Ransomware |  Pipelines |  Critical infrastructure |  Convergence |  Collaboration |  Virtual private networks
检索条件Advanced persistent threats
  • 检索词扩展

NSTL主题词

  • NSTL学科导航