ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2103.15005
  4. Cited By
Strategically-Motivated Advanced Persistent Threat: Definition, Process,
  Tactics and a Disinformation Model of Counterattack

Strategically-Motivated Advanced Persistent Threat: Definition, Process, Tactics and a Disinformation Model of Counterattack

27 March 2021
Atif Ahmad
Jeb Webb
K. Desouza
James Boorman
ArXivPDFHTML

Papers citing "Strategically-Motivated Advanced Persistent Threat: Definition, Process, Tactics and a Disinformation Model of Counterattack"

17 / 17 papers shown
Title
APT-LLM: Embedding-Based Anomaly Detection of Cyber Advanced Persistent Threats Using Large Language Models
APT-LLM: Embedding-Based Anomaly Detection of Cyber Advanced Persistent Threats Using Large Language Models
Sidahmed Benabderrahmane
Petko Valtchev
James Cheney
Talal Rahwan
75
0
0
13 Feb 2025
Detecting APT Malware Command and Control over HTTP(S) Using Contextual Summaries
Detecting APT Malware Command and Control over HTTP(S) Using Contextual Summaries
Almuthanna Alageel
Sergio Maffeis
Imperial College London
46
2
0
07 Feb 2025
Autonomous Identity-Based Threat Segmentation in Zero Trust Architectures
Autonomous Identity-Based Threat Segmentation in Zero Trust Architectures
Sina Ahmadi
41
0
0
10 Jan 2025
A Comprehensive Survey of Advanced Persistent Threat Attribution:
  Taxonomy, Methods, Challenges and Open Research Problems
A Comprehensive Survey of Advanced Persistent Threat Attribution: Taxonomy, Methods, Challenges and Open Research Problems
Nanda Rani
Bikash Saha
Sandeep Kumar Shukla
19
5
0
07 Sep 2024
XFedHunter: An Explainable Federated Learning Framework for Advanced
  Persistent Threat Detection in SDN
XFedHunter: An Explainable Federated Learning Framework for Advanced Persistent Threat Detection in SDN
Huynh Thai Thi
Ngo Duc Hoang Son
Phan The Duy
Nghi Hoang Khoa
Khoa Ngo-Khanh
V. Pham
FedML
8
3
0
15 Sep 2023
Factors Influencing the Organizational Decision to Outsource IT
  Security: A Review and Research Agenda
Factors Influencing the Organizational Decision to Outsource IT Security: A Review and Research Agenda
Antra Arshad
Atif Ahmad
S. Maynard
14
0
0
26 Aug 2022
Walking Under the Ladder Logic: PLC-VBS, a PLC Control Logic
  Vulnerability Discovery Tool
Walking Under the Ladder Logic: PLC-VBS, a PLC Control Logic Vulnerability Discovery Tool
Sam Maesschalck
Alex Staves
R. Derbyshire
B. Green
D. Hutchison
4
0
0
14 Jun 2022
Towards Dynamic Threat Modelling in 5G Core Networks Based on MITRE
  ATT&CK
Towards Dynamic Threat Modelling in 5G Core Networks Based on MITRE ATT&CK
R. Pell
S. Moschoyiannis
E. Panaousis
Ryan Heartfield
27
16
0
25 Aug 2021
Cybersecurity Incident Response in Organisations: A Meta-level Framework
  for Scenario-based Training
Cybersecurity Incident Response in Organisations: A Meta-level Framework for Scenario-based Training
Ashley OÑeill
Atif Ahmad
S. Maynard
16
1
0
11 Aug 2021
Myths and Misconceptions about Attackers and Attacks
Myths and Misconceptions about Attackers and Attacks
Stjepan Gros
AAML
9
0
0
10 Jun 2021
Enhancing Strategic Information Security Management in Organizations
  through Information Warfare Practices
Enhancing Strategic Information Security Management in Organizations through Information Warfare Practices
A. Shah
Atif Ahmad
S. Maynard
Humza Naseer
26
0
0
14 Apr 2021
Dynamic Information Security Management Capability: Strategising for
  Organisational Performance
Dynamic Information Security Management Capability: Strategising for Organisational Performance
Mazino Onibere
Atif Ahmad
S. Maynard
13
0
0
14 Apr 2021
The Dark Web Phenomenon: A Review and Research Agenda
The Dark Web Phenomenon: A Review and Research Agenda
Abhineet Gupta
S. Maynard
Atif Ahmad
16
19
0
14 Apr 2021
Teaching Information Security Management in Postgraduate Tertiary
  Education: The Case of Horizon Automotive Industries
Teaching Information Security Management in Postgraduate Tertiary Education: The Case of Horizon Automotive Industries
Atif Ahmad
S. Maynard
Sameen Motahhir
16
1
0
27 Mar 2021
Teaching Information Security Management Using an Incident of
  Intellectual Property Leakage
Teaching Information Security Management Using an Incident of Intellectual Property Leakage
Atif Ahmad
S. Maynard
Sameen Motahhir
Moneer Alshaikh
15
2
0
27 Mar 2021
Analyzing Power Grid, ICT, and Market Without Domain Knowledge Using
  Distributed Artificial Intelligence
Analyzing Power Grid, ICT, and Market Without Domain Knowledge Using Distributed Artificial Intelligence
Eric M. S. P. Veith
Stephan Balduin
Nils Wenninghoff
Martin Tröschel
Lars Fischer
Astrid Nieße
Thomas Wolgast
R. Sethmann
Bastian Fraune
Torben Woltjen
4
8
0
10 Jun 2020
Towards Identifying Human Actions, Intent, and Severity of APT Attacks
  Applying Deception Techniques -- An Experiment
Towards Identifying Human Actions, Intent, and Severity of APT Attacks Applying Deception Techniques -- An Experiment
Joel Chacon
Sean McKeown
Richard Macfarlane
21
3
0
02 Jun 2020
1