APT

СсылкаДатаОбъем в кбайтахЧисло страницСправка
After Stuxnet: The new rules of cyberwar/ Critical infrastructure providers face a rising tide of increasingly sophisticated and potentially destructive attacks. By Robert L. Mitchell. 2012 33 6 Целевая сетевая атака, один из видов кибероружия
Anatomy Of A Targeted, Persistent Attack. Jan 27, 2010 1136 4 By Kelly Jackson Higgins
Advanced Persistent Threats and other advances attacks. Threat analyses and defence stratagy. (Websense) 2011 2239 13  
Best Practices for Mitigating Advanced Persistent Threats. 18 January 2012 356 20  
Defending Against Advanced Persistent Threats. February 2010 581 6  
Cybersecurity: Defending Against Advanced Persistent Threats. February 2011 252 4  
The Advanced Persistent Threat Attack Model. 2012 1201 12  
Advanced persistent threat. From Wikipedia. 2012 254 3  
Best Practices for Mitigating Advanced Persistent Threats Lawrence Pingree, Neil MacDonald January 2012 356 20  
Defeating Advanced Persistent Threat Malware 2013 1305 16  
New evidence shows Stuxnet used since at least 2007 February 26, 2013 1096 3 By Lucian Constantin
How to seek and destroy advanced persistent threats Nov 17, 2016 362 4 Jian Zhen, InfoWorld
Red alert! Beware of insiders bearing APTs Feb 28, 2017 212 2 InfoWorld, Roger A. Grimes
Double Dragon APT41, a dual espionage and cyber crime operation SPECIAL REPORT 2019 587 68 FireEye