Please use this identifier to cite or link to this item:
http://localhost:8080/xmlui/handle/123456789/1265
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | ADELAIYE, Oluwasegun | - |
dc.date.accessioned | 2024-05-21T11:06:36Z | - |
dc.date.available | 2024-05-21T11:06:36Z | - |
dc.date.issued | 2018-04-02 | - |
dc.identifier.citation | 1. Nicho, M., Adelaiye, O., & Kamoun, F. (2018). Identifying Vulnerabilities in APT Attacks: A Simulated Approach. In New Technologies, Mobility and Security (NTMS), 2018 9th IFIP International Conference on (pp. 1-4). IEEE. | en_US |
dc.identifier.uri | http://localhost:8080/xmlui/handle/123456789/1265 | - |
dc.description.abstract | This research aims to identify some vulnerabilities of advanced persistent threat (APT) attacks using multiple simulated attacks in a virtualized environment. Our experimental study shows that while updating the antivirus software and the operating system with the latest patches may help in mitigating APTs, APT threat vectors could still infiltrate the strongest defenses. Accordingly, we highlight some critical areas of security concern that need to be addressed. | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.subject | Malware | en_US |
dc.subject | Universal Serial Bus | en_US |
dc.subject | Payloads | en_US |
dc.subject | Browsers | en_US |
dc.subject | Firewalls | en_US |
dc.title | Identifying Vulnerabilities in APT Attacks: A Simulated Approach | en_US |
dc.type | Article | en_US |
Appears in Collections: | Research Articles |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Identifying_Vulnerabilities_in_APT_Attacks_A_Simulated_Approach.pdf | 479.49 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.