Abstract: Advanced Persistent Threats (APTs) are one of the most perilous forms of cyberattacks, partly because they concentrate on certain, high-value targets. A pivotal stage in these assaults is ...
Abstract: Covert tunnel is gradually used in threat attacks, such as remote control and data theft. In this paper, we propose a baseline feature-based malicious traffic detection method for Internet ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results