It is widely cited that cyber attacks have become more prevalent on a global scale. In light of this, the cybercrime industry has been established for various purposes such as political, economic and socio-cultural aims. Such attacks can be used as a harmful weapon and cyberspace is often cited as a battlefield. One of the most serious types of cyber attacks is the Advanced Persistent Threat (APT), which is a new and more complex version of multi-step attack. The main aim of the APT attack is espionage and data exfiltration, which has the potential to cause significant damage and substantial financial loss. This research aims to develop a novel system to detect and predict APT attacks. A Machine-Learning-based APT detection system...
Rapid shifting by government sectors and companies to provide their services and products over the i...
Paper presented at the 5th Strathmore International Mathematics Conference (SIMC 2019), 12 - 16 Augu...
Targeted attacks on digital infrastructures are a rising threat against the confidentiality, integri...
As one of the most serious types of cyber attack, Advanced Persistent Threats (APT) have caused majo...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
Cyber security has become a matter of a global interest and several attacks target industrial compan...
Cyber security has become a matter of a global interest and several attacks target industrial compan...
Modern-day malware is intelligent enough to hide its presence and perform stealthy operations in the...
An advanced persistent threat [APT] is a multistage selective attack that obtains unauthorised acces...
Advanced Persistent Threats (APTs) have been a major challenge in securing both Information Technolo...
The number of cybersecurity incidents is on the rise despite significant investment in security meas...
The number of cybersecurity incidents is on the rise despite significant investment in security meas...
Advanced Persistent Threat is a very sophisticated targeted attack aimed at organizations. Several a...
For years governments, organizations and companies have made great efforts to keep hackers, malware,...
Predicting cyberattacks using machine learning has become imperative since cyberattacks have increas...
Rapid shifting by government sectors and companies to provide their services and products over the i...
Paper presented at the 5th Strathmore International Mathematics Conference (SIMC 2019), 12 - 16 Augu...
Targeted attacks on digital infrastructures are a rising threat against the confidentiality, integri...
As one of the most serious types of cyber attack, Advanced Persistent Threats (APT) have caused majo...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
Cyber security has become a matter of a global interest and several attacks target industrial compan...
Cyber security has become a matter of a global interest and several attacks target industrial compan...
Modern-day malware is intelligent enough to hide its presence and perform stealthy operations in the...
An advanced persistent threat [APT] is a multistage selective attack that obtains unauthorised acces...
Advanced Persistent Threats (APTs) have been a major challenge in securing both Information Technolo...
The number of cybersecurity incidents is on the rise despite significant investment in security meas...
The number of cybersecurity incidents is on the rise despite significant investment in security meas...
Advanced Persistent Threat is a very sophisticated targeted attack aimed at organizations. Several a...
For years governments, organizations and companies have made great efforts to keep hackers, malware,...
Predicting cyberattacks using machine learning has become imperative since cyberattacks have increas...
Rapid shifting by government sectors and companies to provide their services and products over the i...
Paper presented at the 5th Strathmore International Mathematics Conference (SIMC 2019), 12 - 16 Augu...
Targeted attacks on digital infrastructures are a rising threat against the confidentiality, integri...