1 Institute of Information Engineering, CAS, Beijing 100093, China 2 National Institute of Information Security Technology, Beijing 100029 3 National Institute of Information Security Technology, Beijing 100029
Mingjie Ma,Fenggang Sun,Lidong Zhai,Yuejin Du. Security Cballenges Facing Our Country and Countermeasure Recommendations Under New Network Security Tbreats[J]. Telecommunications Science, 2014, 30(7): 8-12.
Baize E . Developing secure products in the age of advanced persistent threats. IEEE Security &; Privacy, 2012,10 (3): 88~92.
3
Virvilis N , Gritzalis D , Apostolopoulos T . Trusted computing vs advanced persistent threats: can a defender win this game. Proceedings of 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing, Autonomic and Trusted Computing(UIC/ATC), Vietri Sul Mare, 2013:396~403.
4
Li F , Lai A , Ddl D . Evidence of advanced persistent threat: a case study of malware for political espionage. Proceedings of the 6th International Conference on Malicious and Unwanted Software(MALWARE), Fajardo, 2011:102~109.
5
Mustafa T . Malicious data leak prevention and purposeful evasion attacks: an approach to advanced persistent threat(APT) management. Proceedings of 2013 Saudi International Electronics, Communications and Photonics Conference (SIECPC), Riyadh. Proceedings of 2013 Saudi International Electronics, Communications and Photonics Conference (SIECPC), Riyadh, 2013: 1~5.
6
Symantec Security Response. The Elderwood Project(Infographic).
7
杜跃进 . 国际对抗环境下的网络安全防护能力建设. 信息网络安全, 2013(3): 86~88.
8
杜跃进 . 陌生的危机:我国的网络安全形势. 中国金融电脑, 2014(1): 32~35
9
Symantec Security Response The Elderwood Project(Infographic).