A comparative study between deep learning algorithm and bayesian network on Advanced Persistent Threat (APT) attack detection
Advanced Persistent Threat (APT) attacks are a major concern for the cybersecurity in digital world due to their advanced nature. Attackers are skilful to cause maximal destruction for targeted cyber environment. These APT attacks are also well funded by governments in many cases. The APT atta...
| Main Authors: | Ooi, Hui Ni, Ab Rahman, Nurul Hidayah |
|---|---|
| Format: | Other |
| Language: | English |
| Published: |
Penerbit UTHM
2021
|
| Subjects: | |
| Online Access: | http://eprints.uthm.edu.my/6696/ http://eprints.uthm.edu.my/6696/1/P13606_fc6b8cdc19cf367513bb5fecde8c41eb.pdf |
Similar Items
A comparative study between deep learning algorithm and bayesian network on Advanced Persistent Threat (APT) attack detection
by: Ooi, Hui Ni, et al.
Published: (2021)
by: Ooi, Hui Ni, et al.
Published: (2021)
A cyber kill chain approach for detecting advanced persistent threats
by: Ahmed, Yussuf, et al.
Published: (2021)
by: Ahmed, Yussuf, et al.
Published: (2021)
Online social networking: a source of intelligence for advanced persistent threats
by: Abdul Molok , Nurul Nuha, et al.
Published: (2012)
by: Abdul Molok , Nurul Nuha, et al.
Published: (2012)
Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique
by: Ali Mohamed, Nachaat Abdelatif
Published: (2022)
by: Ali Mohamed, Nachaat Abdelatif
Published: (2022)
Deep learning-based classification model for botnet attack detection
by: Ahmed, Abdulghani Ali, et al.
Published: (2020)
by: Ahmed, Abdulghani Ali, et al.
Published: (2020)
Advanced persistent threats awareness and readiness: a case study in Malaysian financial institutions
by: Zainudin, Zeti Suhana, et al.
Published: (2019)
by: Zainudin, Zeti Suhana, et al.
Published: (2019)
Information leakage through online social networking: Opening the doorway for advanced persistence threats
by: Abdul Molok , Nurul Nuha, et al.
Published: (2010)
by: Abdul Molok , Nurul Nuha, et al.
Published: (2010)
Information Leakage through online social networking: opening the doorway for advanced persistence threats
by: Abdul Molok , Nurul Nuha, et al.
Published: (2011)
by: Abdul Molok , Nurul Nuha, et al.
Published: (2011)
Detecting and mitigating botnet attacks using deep
learning in software-defined networks
by: Muhammad Waqas, Nadeem
Published: (2023)
by: Muhammad Waqas, Nadeem
Published: (2023)
'Micromobility vehicle ban APT'
by: Daim, Nuradzimmah
Published: (2022)
by: Daim, Nuradzimmah
Published: (2022)
Comparative performance of machine learning methods for classification on phishing attack detection
by: Siti Noranisah, Wan Ahmad, et al.
Published: (2020)
by: Siti Noranisah, Wan Ahmad, et al.
Published: (2020)
A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection
by: Noor Syahirah, Nordin, et al.
Published: (2021)
by: Noor Syahirah, Nordin, et al.
Published: (2021)
Mapping Social Media Insider Threat Attack Vectors
by: Armstrong, Colin
Published: (2013)
by: Armstrong, Colin
Published: (2013)
An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm
by: Abdulkareem, Fatimah Saleem, et al.
Published: (2023)
by: Abdulkareem, Fatimah Saleem, et al.
Published: (2023)
Uricase biofunctionalized plasmonic sensor for uric acid detection with APTES-modified gold nanotopping
by: Onifade, Olabisi Abdullahi, et al.
Published: (2024)
by: Onifade, Olabisi Abdullahi, et al.
Published: (2024)
Electrochemical enhancement using iron oxide-gold nanocomposite for detection of tuberculosis based on rGO-APTES modified screen printed electrode
by: Syed Amri, Syazana Ameera
Published: (2018)
by: Syed Amri, Syazana Ameera
Published: (2018)
Distributed denial of service attack Detection in IoT networks using deep learning and feature fusion : A review
by: Nuhu Ahmad, Abdul hafiz, et al.
Published: (2024)
by: Nuhu Ahmad, Abdul hafiz, et al.
Published: (2024)
Machine learning and deep learning approaches for detecting DDoS attacks in cloud environments
by: Khan, Muhammad Asif, et al.
Published: (2025)
by: Khan, Muhammad Asif, et al.
Published: (2025)
Test of intertemporal variability of APT in a volatile economy
by: Sabetfar, Pooya, et al.
Published: (2013)
by: Sabetfar, Pooya, et al.
Published: (2013)
Investigate And Analysis Of Deep Learning And Machine Learning Algorithm For Face Mask Detection System
by: Muhammad Ezzuddeen, Suratman
Published: (2022)
by: Muhammad Ezzuddeen, Suratman
Published: (2022)
A hybridization of butterfly optimization algorithm and harmony search for fuzzy modelling in phishing attack detection
by: Noor Syahirah, Nordin, et al.
Published: (2023)
by: Noor Syahirah, Nordin, et al.
Published: (2023)
Advancements in ammonia gas detection: a comparative study of sensor technologies
by: Amran, Abdul Hadi, et al.
Published: (2024)
by: Amran, Abdul Hadi, et al.
Published: (2024)
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
by: Firas Mohammed Aswad, Firas Mohammed Aswad, et al.
Published: (2023)
by: Firas Mohammed Aswad, Firas Mohammed Aswad, et al.
Published: (2023)
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
by: Mohammed Aswad, Firas, et al.
Published: (2023)
by: Mohammed Aswad, Firas, et al.
Published: (2023)
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
by: Mohammed Aswad, Firas, et al.
Published: (2023)
by: Mohammed Aswad, Firas, et al.
Published: (2023)
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
by: Mohammed Aswad, Firas, et al.
Published: (2023)
by: Mohammed Aswad, Firas, et al.
Published: (2023)
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
by: Mohammed Aswad, Firas, et al.
Published: (2023)
by: Mohammed Aswad, Firas, et al.
Published: (2023)
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
by: Mohammed Aswad, Firas, et al.
Published: (2023)
by: Mohammed Aswad, Firas, et al.
Published: (2023)
A comparative analysis of solar photovoltaic advanced fault detection and monitoring techniques
by: Siti Nor Azlina, Mohd Ghazali, et al.
Published: (2023)
by: Siti Nor Azlina, Mohd Ghazali, et al.
Published: (2023)
An evaluation on KNN-SVM algorithm for detection and prediction of DDoS attack
by: Yusof, Ahmad Riza’ain, et al.
Published: (2016)
by: Yusof, Ahmad Riza’ain, et al.
Published: (2016)
Early bacterial detection in bloodstream infection using deep transfer learning algorithm
by: Son Ali, Akbar, et al.
Published: (2023)
by: Son Ali, Akbar, et al.
Published: (2023)
Evaluation and Analysis The CAPM and APT Models in Spanish Stock Market
by: Liang, Yue
Published: (2012)
by: Liang, Yue
Published: (2012)
Testing the CAPM and the APT: Evidence from the UK Stock Market
by: WANG, Zheng
Published: (2010)
by: WANG, Zheng
Published: (2010)
Testing the CAPM and the APT: Evidence from the UK Stock Market
by: WANG, Zheng
Published: (2010)
by: WANG, Zheng
Published: (2010)
An Intelligence Technique For Denial Of Service (Dos) Attack Detection
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
Monitoring of metallurgical plant performance with Bayesian change point detection algorithms
by: Aldrich, Chris, et al.
Published: (2012)
by: Aldrich, Chris, et al.
Published: (2012)
IOT threats detection using few shots learning
by: Chua, Cheng Han
Published: (2024)
by: Chua, Cheng Han
Published: (2024)
Comparative Toxicity And Persistence Of Pyriproxyfen, Diflubenzuron, And Temephos Against Aedes Aegypti (L.).
by: Loo, Siaw Fang
Published: (2013)
by: Loo, Siaw Fang
Published: (2013)
Hierarchical Bayesian estimation for stationary autoregressive models using reversible jump MCMC algorithm
by: Suparman, S., et al.
Published: (2018)
by: Suparman, S., et al.
Published: (2018)
Implicit evaluations and physiological threat responses in people with persistent low back pain and fear of bending
by: Caneiro, J., et al.
Published: (2017)
by: Caneiro, J., et al.
Published: (2017)
Similar Items
-
A comparative study between deep learning algorithm and bayesian network on Advanced Persistent Threat (APT) attack detection
by: Ooi, Hui Ni, et al.
Published: (2021) -
A cyber kill chain approach for detecting advanced persistent threats
by: Ahmed, Yussuf, et al.
Published: (2021) -
Online social networking: a source of intelligence for advanced persistent threats
by: Abdul Molok , Nurul Nuha, et al.
Published: (2012) -
Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique
by: Ali Mohamed, Nachaat Abdelatif
Published: (2022) -
Deep learning-based classification model for botnet attack detection
by: Ahmed, Abdulghani Ali, et al.
Published: (2020)