Advanced Persistent threats and how to monitor and deter them

Publisher Website


Just a decade ago, attackers targeting electronic networks and communications were largely motivated by gaining kudos among their peers. The main consequence of such attacks was the cost of downtime and cleaning up systems that had been compromised. Today, the primary reasons for such attacks are to steal proprietary information, to sabotage systems or for… (More)
DOI: 10.1016/S1353-4858(11)70086-1


Figures and Tables

Sorry, we couldn't extract any figures or tables for this paper.


Citations per Year

158 Citations

AcadArt Finder estimates that this publication has 158 citations based on the available data.

See our FAQ for additional information.

Slides referencing similar topics

  • Advanced Persistent Threats

    Craig Harwood • Oct 17, 2017

  • Advanced Persistent Threats

    George R Magee • Jan 15, 2016

  • Countering Advanced Persistent Threats

    Eric Chan • Dec 07, 2015