CORE
🇺🇦Â
 make metadata, not war
Services
Services overview
Explore all CORE services
Access to raw data
API
Dataset
FastSync
Content discovery
Recommender
Discovery
OAI identifiers
OAI Resolver
Managing content
Dashboard
Bespoke contracts
Consultancy services
Support us
Support us
Membership
Sponsorship
Community governance
Advisory Board
Board of supporters
Research network
About
About us
Our mission
Team
Blog
FAQs
Contact us
Modeling Attack Process of Advanced Persistent Threat Using Network Evolution
Authors
Dong WANG
Guowu YANG
+3Â more
Ruidong CHEN
Weina NIU
Xiaosong ZHANG
Publication date
1 January 2017
Publisher
'Institute of Electronics, Information and Communications Engineers (IEICE)'
Doi
Cite
Abstract
Abstract is not available.
Similar works
Full text
Available Versions
Crossref
See this paper in CORE
Go to the repository landing page
Download from data provider
info:doi/10.1587%2Ftransinf.20...
Last time updated on 04/11/2020