Advanced Persistent threats and how to monitor and deter them, Network Security, vol.2011, issue.8, pp.16-19, 2011. ,
DOI : 10.1016/S1353-4858(11)70086-1
2010 data breach investigations report, 2010. ,
A Context-Based Detection Framework for Advanced Persistent Threats, 2012 International Conference on Cyber Security, pp.69-74, 2012. ,
DOI : 10.1109/CyberSecurity.2012.16
Attack chain detection Statistical Analysis and Data Mining: The ASA, Data Science Journal, vol.8, pp.5-6, 2015. ,
TerminAPTor: Highlighting Advanced Persistent Threats through Information Flow Tracking, 2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pp.1-5, 2016. ,
DOI : 10.1109/NTMS.2016.7792480
URL : https://hal.archives-ouvertes.fr/hal-01417612
APT1: Exposing one of china's cyber espionage units, 2013. ,
Applications of hidden Markov models to detecting multi-stage network attacks, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the, p.10, 2003. ,
DOI : 10.1109/HICSS.2003.1174909
APT models Available: https, 2016. ,
The viterbi algorithm, Proceedings of the IEEE, vol.61, issue.3, pp.268-278, 1973. ,
DOI : 10.1109/PROC.1973.9030
A revealing introduction to hidden Markov models, 2004. ,
A new look at the statistical model identification, IEEE Transactions on Automatic Control, vol.19, issue.6, pp.716-723, 1974. ,
DOI : 10.1109/TAC.1974.1100705
Estimating the dimension of a model The annals of statistics, pp.461-464, 1978. ,