C. Tankard, Advanced Persistent threats and how to monitor and deter them, Network Security, vol.2011, issue.8, pp.16-19, 2011.
DOI : 10.1016/S1353-4858(11)70086-1

. Verizon, 2010 data breach investigations report, 2010.

P. Giura and W. Wang, A Context-Based Detection Framework for Advanced Persistent Threats, 2012 International Conference on Cyber Security, pp.69-74, 2012.
DOI : 10.1109/CyberSecurity.2012.16

J. Sexton, C. Storlie, and J. Neil, Attack chain detection Statistical Analysis and Data Mining: The ASA, Data Science Journal, vol.8, pp.5-6, 2015.

G. Brogi, V. Viet-triem, and . Tong, TerminAPTor: Highlighting Advanced Persistent Threats through Information Flow Tracking, 2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pp.1-5, 2016.
DOI : 10.1109/NTMS.2016.7792480

URL : https://hal.archives-ouvertes.fr/hal-01417612

. Mandiant-intelligence and . Center, APT1: Exposing one of china's cyber espionage units, 2013.

D. Ourston, S. Matzner, W. Stump, and B. Hopkins, Applications of hidden Markov models to detecting multi-stage network attacks, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the, p.10, 2003.
DOI : 10.1109/HICSS.2003.1174909

G. Brogi, APT models Available: https, 2016.

G. D. Forney, The viterbi algorithm, Proceedings of the IEEE, vol.61, issue.3, pp.268-278, 1973.
DOI : 10.1109/PROC.1973.9030

M. Stamp, A revealing introduction to hidden Markov models, 2004.

H. Akaike, A new look at the statistical model identification, IEEE Transactions on Automatic Control, vol.19, issue.6, pp.716-723, 1974.
DOI : 10.1109/TAC.1974.1100705

G. Schwarz, Estimating the dimension of a model The annals of statistics, pp.461-464, 1978.