Tracing advanced persistent threats in networked systems

Masahiko Kato, Takumi Matsunami, Akira Kanaoka, Hiroshi Koide, Eiji Okamoto

研究成果: 著書/レポートタイプへの貢献

6 引用 (Scopus)

抄録

We herein discuss the modeling of target information systems as well as various attacks, in order to clarify the impact of Advanced Persistent Threats (APTs) and to enable efficient planning of defense strategies to counter APTs.

元の言語英語
ホスト出版物のタイトルAutomated Security Management
出版者Springer International Publishing
ページ179-187
ページ数9
ISBN(電子版)9783319014333
ISBN(印刷物)9783319014326
DOI
出版物ステータス出版済み - 1 1 2013

Fingerprint

Information systems
Planning

All Science Journal Classification (ASJC) codes

  • Computer Science(all)

これを引用

Kato, M., Matsunami, T., Kanaoka, A., Koide, H., & Okamoto, E. (2013). Tracing advanced persistent threats in networked systems. : Automated Security Management (pp. 179-187). Springer International Publishing. https://doi.org/10.1007/978-3-319-01433-3_11

Tracing advanced persistent threats in networked systems. / Kato, Masahiko; Matsunami, Takumi; Kanaoka, Akira; Koide, Hiroshi; Okamoto, Eiji.

Automated Security Management. Springer International Publishing, 2013. p. 179-187.

研究成果: 著書/レポートタイプへの貢献

Kato, M, Matsunami, T, Kanaoka, A, Koide, H & Okamoto, E 2013, Tracing advanced persistent threats in networked systems. : Automated Security Management. Springer International Publishing, pp. 179-187. https://doi.org/10.1007/978-3-319-01433-3_11
Kato M, Matsunami T, Kanaoka A, Koide H, Okamoto E. Tracing advanced persistent threats in networked systems. : Automated Security Management. Springer International Publishing. 2013. p. 179-187 https://doi.org/10.1007/978-3-319-01433-3_11
Kato, Masahiko ; Matsunami, Takumi ; Kanaoka, Akira ; Koide, Hiroshi ; Okamoto, Eiji. / Tracing advanced persistent threats in networked systems. Automated Security Management. Springer International Publishing, 2013. pp. 179-187
@inbook{1e260bd22e524d45a7f9f2c912aa993c,
title = "Tracing advanced persistent threats in networked systems",
abstract = "We herein discuss the modeling of target information systems as well as various attacks, in order to clarify the impact of Advanced Persistent Threats (APTs) and to enable efficient planning of defense strategies to counter APTs.",
author = "Masahiko Kato and Takumi Matsunami and Akira Kanaoka and Hiroshi Koide and Eiji Okamoto",
year = "2013",
month = "1",
day = "1",
doi = "10.1007/978-3-319-01433-3_11",
language = "English",
isbn = "9783319014326",
pages = "179--187",
booktitle = "Automated Security Management",
publisher = "Springer International Publishing",

}

TY - CHAP

T1 - Tracing advanced persistent threats in networked systems

AU - Kato, Masahiko

AU - Matsunami, Takumi

AU - Kanaoka, Akira

AU - Koide, Hiroshi

AU - Okamoto, Eiji

PY - 2013/1/1

Y1 - 2013/1/1

N2 - We herein discuss the modeling of target information systems as well as various attacks, in order to clarify the impact of Advanced Persistent Threats (APTs) and to enable efficient planning of defense strategies to counter APTs.

AB - We herein discuss the modeling of target information systems as well as various attacks, in order to clarify the impact of Advanced Persistent Threats (APTs) and to enable efficient planning of defense strategies to counter APTs.

UR - http://www.scopus.com/inward/record.url?scp=84926147163&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84926147163&partnerID=8YFLogxK

U2 - 10.1007/978-3-319-01433-3_11

DO - 10.1007/978-3-319-01433-3_11

M3 - Chapter

AN - SCOPUS:84926147163

SN - 9783319014326

SP - 179

EP - 187

BT - Automated Security Management

PB - Springer International Publishing

ER -