Search Results
- Articles
- Books & Media
- Our Website
- Collection Guides
- Archival Materials
ArticlesSee all articles results »
From journals and magazines
-
A novel approach for detecting advanced persistent threats A novel approach for (...)
http://duke.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LSwMxEB7Ekx7EF_gmB6-h2yT7CJRCLS7qTRHE05Ine5C16Oof6B83k7SwnjzUawgz5BuYzEwy3wBcM-98nnNHS8ksFZ5bqnLNaQjGMzM2xvIcG4VfqodX9vhU1fPBqC_8E5bogRNwoyoz0mI3aMi3RWkyLRTSqFWF1Voq5tD7hqx8kEwlHzzGF704WSU4GiR1-0XKH2-Peh_2VmEfmSV1B7DlukPYHZABHsFyRrr3b_dG1jTfJMSTxDqs8ocNZNJO1w_2ZIFVrmCfrid9i2Hf52TUTsnGEo7hvr59nt9RPEOzSEwUDXJDx4WAWLNCrPkLMX4CRBWZVF5LwX0RcDLKCa2cyo1kJSs0P4WbzRWd_YeQc9hh2HEQf5BcwHb_8eUu0-SGq2jzHyfzuYE
Egyptian Informatics Journal, Volume 23, Issue 4, pp. 45 - 55
Journal Article : Full Text Online
-
APT-scope: A novel framework to predict advanced persistent threat groups from enriched (...)
http://duke.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1NS8QwEI3iSQ_iF_jNHLyW3U2atJFloS4W15PKgngqaZpQRdrSrYL_3qTpQm4e9OK1hEzoG8ib5M0LQldYK00pUUHEcRGEmhSBoDkJDBkfy4mUBaG2Ufg5vn_Bj09xOvee-rKaMGcP7H7ciMsx43ERMUVFSGNmtk_M8kmOI8EE5r17qanKvWLqzfEWQ3U8I3487BjpHtodqB4kLsQ-2lTVAdrxDAAPNxbJwzLoG0OuIYGq_lTvoNdyKehqaFp7kdLBtJytb-uhsUdcBpyqg660nG86KmfQt2eswLaLgMkJq_AsoLRil9rkiDIFPgwmqRYKqJz8G2oN8itXrY3gzfbqOXXCf1jkEVqkt8v5XWCRyBrnoZFZV-v-g8E6G7DOfsKaHCMQbMyFznlINDPkTwoV5kIJKjmOzGBygm5-H-j0LyY5Q9vYMCAnSDtHW137oS7cmxOXfbZ-A8RcAAU
Engineering Science And Technology, An International Journal, Volume 57, p. 101791
Journal Article : Full Text Online
-
Poirot: Causal Correlation Aided Semantic Analysis for Advanced Persistent Threat Detection
http://duke.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1bS8MwGA3OJ1-cN3A6JQ8-iXVpLm0jYzCqQ3zyMhGfSm5lA91k6_6_SZpOBiK-9SGBlvOlOV9yvu8AcIFLUzJGTJRyrCNaEh0JJklkyThSsVKaMFco_JY9vOOn52yUb4GrdS2MMcaLz8y1e_R3-XquVu6orMeZK2hIWqCVclTXav301cu86aFjBJElyXG4wYwR741vX3KbCeLYJqiuoxTf2IO8qcrmn5iE7WXUBm_Ni3lt9XWtLalPGTZE1033xv9-wx7YDYwTDusQ2QdbZnYA2o2bAwyL-xDIx_l0Ma9uYC5WSzshd74dtVIODqfaaPhiPi0OUwWbTibQMl7YnwyGQUgAnZ7exc2sguOJo6P93mQAb03lBV-zI_A6uhvn91FwYIiUpQFVVFIqyjgzWAqBOOIEIcVs7FGWIoZUySXTsUZU80wiIXSaGS1ojCSRmplEkGMARYK4KCWnpEwsW1PCUCmMYIrjFCeSdABqwChU6Evu7DE-Cp-fIF44_AqHXxHw64DL9ZSvuinHX4MPHQrrgQGADug2iBdh2S4LnNoMj7oc9OT3WadgB7v6By8y64LtarEyZ7WPxLmPx2-pyuBa
Ieee Transactions On Dependable And Secure Computing, Volume 19, Issue 5, pp. 3546 - 3563
Journal Article : Full Text Online
Books & MediaSee all books & media results »
Books, music, movies and more
-
Advanced persistent threat : understanding the danger and how to protect your organization
https://find.library.duke.edu/catalog/DUKE99119314296108501
Book : View Online
-
Advanced persistent threat hacking : the art and science of hacking any organization
https://find.library.duke.edu/catalog/DUKE99119266396408501
Book : View Online
-
Attribution of Advanced Persistent Threats : How to Identify the Actors Behind Cyber-Espionage
https://find.library.duke.edu/catalog/DUKE99119429216108501
Book : View Online
Our WebsiteSee all website results »
Guides, policies, news more
-
https://sites.fuqua.duke.edu/fordlibrary/page/35/
https://sites.fuqua.duke.edu/fordlibrary/page/35/
But, overwhelmingly advanced societies feel the benefits of technology outweigh the risks.
-
Scholarly Communications @ Duke - Page 23 of 58 - Discussions about the changing world of scholarly
https://blogs.library.duke.edu/scholcomm/page/23/
Compulsory licenses nearly always require continuing judicial oversight due to the threat of monopolistic pricing and anti-trust concerns.
Collection Guides
Detailed inventories of archival collections
Some materials and descriptions may include offensive content. More info