ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
38
views
0
references
Top references
cited by
45
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,721
similar
All similar
Record
: found
Abstract
: not found
Article
: not found
Advanced Persistent threats and how to monitor and deter them
Author(s):
Colin Tankard
Publication date
Created:
August 2011
Publication date
(Print):
August 2011
Journal:
Network Security
Publisher:
Elsevier BV
Read this article at
ScienceOpen
Publisher
Review
Review article
Invite someone to review
Bookmark
Cite as...
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Abstract
Related collections
IUCN Red List of Ecosystems
Author and article information
Journal
Title:
Network Security
Abbreviated Title:
Network Security
Publisher:
Elsevier BV
ISSN (Print):
13534858
Publication date Created:
August 2011
Publication date (Print):
August 2011
Volume
: 2011
Issue
: 8
Pages
: 16-19
Article
DOI:
10.1016/S1353-4858(11)70086-1
SO-VID:
77db347b-05e7-470a-9ea5-52ea30feebde
Copyright ©
© 2011
License:
http://www.elsevier.com/tdm/userlicense/1.0/
History
Data availability:
Comments
Comment on this article
Sign in to comment
scite_
Similar content
2,721
Do analysts’' forecast properties deter suboptimal labor investment decisions? Evidence from Regulation Fair Disclosure
Authors:
Mohammed Sualihu
,
Alfred E. Yawson
,
Iliyas Yusoff
Final efficacy outcomes of atezolizumab with chemoradiation for unresectable NSCLC: The phase II DETERRED trial.
Authors:
Yufei Liu
,
Luyang Yao
,
Neda Kalhor
…
Are the Baltic States and NATO on the right path in deterring Russia in the Baltic?
Authors:
Viljar Veebel
,
Illimar Ploom
See all similar
Cited by
44
Software-Defined Networking: A Comprehensive Survey
Authors:
Diego Kreutz
,
Steve Uhlig
,
Siamak Azodolmolky
…
A Study on Advanced Persistent Threats
Authors:
Ping Chen
,
Lieven Desmet
,
Christophe Huygens
Trust Management for Vehicular Networks: An Adversary-Oriented Overview
Authors:
Chaker Kerrache
,
Carlos Calafate
,
Juan-Carlos Cano
…
See all cited by