{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,18]],"date-time":"2026-04-18T17:51:34Z","timestamp":1776534694681,"version":"3.51.2"},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642387081","type":"print"},{"value":"9783642387098","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-44885-4_5","type":"book-chapter","created":{"date-parts":[[2014,8,27]],"date-time":"2014-08-27T05:10:25Z","timestamp":1409116225000},"page":"63-72","source":"Crossref","is-referenced-by-count":232,"title":["A Study on Advanced Persistent Threats"],"prefix":"10.1007","author":[{"given":"Ping","family":"Chen","sequence":"first","affiliation":[]},{"given":"Lieven","family":"Desmet","sequence":"additional","affiliation":[]},{"given":"Christophe","family":"Huygens","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"Alperovitch, D.: Revealed: Operation Shady RAT (2011)"},{"key":"5_CR2","unstructured":"Bejtlich, R.: What Is APT and What Does It Want (2010), \n                    \n                      http:\/\/taosecurity.blogspot.be\/2010\/01\/what-is-apt-and-what-does-it-want.html"},{"key":"5_CR3","unstructured":"Bennett, J.T., et al.: Poison Ivy: Assessing Damage and Extracting Intelligence (2013)"},{"key":"5_CR4","unstructured":"Giura, P., Wang, W.: Using large scale distributed computing to unveil advanced persistent threats. SCIENCE\u00a01(3) (2013)"},{"key":"5_CR5","unstructured":"Gragido, W.: Lions at the Watering Hole \u2013 The \u201cVOHO\u201d Affair (2012), \n                    \n                      http:\/\/blogs.rsa.com\/lions-at-the-watering-hole-the-voho-affair\/"},{"key":"5_CR6","unstructured":"Haq, T., Khalid, Y.: Internet Explorer 8 Exploit Found in Watering Hole Campaign Targeting Chinese Dissidents (2013)"},{"key":"5_CR7","unstructured":"Hutchins, E.M., et al.: Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains. In: Proceedings of the 6th International Conference on Information Warfare and Security (2013)"},{"key":"5_CR8","unstructured":"ISACA. Advanced Persistent Threat Awareness (2013)"},{"key":"5_CR9","unstructured":"Kaspersky. The Icefog APT: A Tale of Cloak and Three Daggers (2013)"},{"key":"5_CR10","unstructured":"Kindlund, D., et al.: Operation SnowMan: DeputyDog Actor Compromises US Veterans of Foreign Wars Website (2014)"},{"key":"5_CR11","unstructured":"FireEye Labs. Fireeye advanced threat report 2013 (2014)"},{"key":"5_CR12","unstructured":"McAfee Labs. Protecting Your Critical Assets: Lessons Learned from \u201cOperation Aurora\u201d (2010)"},{"key":"5_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/978-3-642-40820-5_34","volume-title":"Network and Parallel Computing","author":"S.-T. Liu","year":"2013","unstructured":"Liu, S.-T., Chen, Y.-M., Lin, S.-J.: A novel search engine to uncover potential victims for APT investigations. In: Hsu, C.-H., Li, X., Shi, X., Zheng, R. (eds.) NPC 2013. LNCS, vol.\u00a08147, pp. 405\u2013416. Springer, Heidelberg (2013)"},{"key":"5_CR14","unstructured":"Mandiant. The Advanced Persistent Threat (2010)"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Mandiant. APT1: Exposing One of China\u2019s Cyber Espionage Unit (2013)","DOI":"10.1201\/b16112-2"},{"key":"5_CR16","unstructured":"Information Warfare Monitor and Shadowserver Foundation. Shadows in the Cloud: Investigating Cyber Espionage 2.0 (2010)"},{"key":"5_CR17","unstructured":"NIST. Managing Information Security Risk: Organization, Mission, and Information System View. SP 800-39 (2011)"},{"key":"5_CR18","unstructured":"O\u2019Gorman, G., McDonald, G.: The Elderwood Project (2012)"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Zubair Rafique, M., et al.: Evolutionary algorithms for classification of malware families through different network behaviors. In: Proceedings of the Genetic and Evolutionary Computation Conference (2014)","DOI":"10.1145\/2576768.2598238"},{"key":"5_CR20","unstructured":"Rivner, U.: Anatomy of an Attack (2011), \n                    \n                      https:\/\/blogs.rsa.com\/anatomy-of-an-attack\/"},{"key":"5_CR21","unstructured":"Schmid, M., et al.: Protecting data from malicious software. In: Proceedings of the 18th Annual Computer Security Applications Conference, IEEE (2002)"},{"key":"5_CR22","unstructured":"Singh, A., Bu, Z.: Hot Knives Through Butter: Evading File-based Sandboxes (2014)"},{"key":"5_CR23","unstructured":"Symantec. Advanced Persistent Threats: A Symantec Perspective (2011)"},{"issue":"8","key":"5_CR24","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/S1353-4858(11)70086-1","volume":"2011","author":"C. Tankard","year":"2011","unstructured":"Tankard, C.: Advanced Persistent Threats and how to monitor and deter them. Network security\u00a02011(8), 16\u201319 (2011)","journal-title":"Network security"},{"issue":"11","key":"5_CR25","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/S1353-4858(11)70118-0","volume":"2011","author":"G. Thomson","year":"2011","unstructured":"Thomson, G.: APTs: a poorly understood challenge. Network Security\u00a02011(11), 9\u201311 (2011)","journal-title":"Network Security"},{"key":"5_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1007\/978-3-642-33338-5_4","volume-title":"Research in Attacks, Intrusions, and Defenses","author":"O. Thonnard","year":"2012","unstructured":"Thonnard, O., Bilge, L., O\u2019Gorman, G., Kiernan, S., Lee, M.: Industrial espionage and targeted attacks: Understanding the characteristics of an escalating threat. In: Balzarotti, D., Stolfo, S.J., Cova, M. (eds.) RAID 2012. LNCS, vol.\u00a07462, pp. 64\u201385. Springer, Heidelberg (2012)"},{"key":"5_CR27","unstructured":"TrendLabs. Spear-Phishing Email: Most Favored APT Attack Bait (2012)"},{"key":"5_CR28","unstructured":"Villeneuve, N., Bennett, J.T.: XtremeRAT: Nuisance or Threat (2014)"},{"key":"5_CR29","unstructured":"Villeneuve, N., et al.: Operation Ke3chang: Targeted Attacks Against Ministries of Foreign Affairs (2013)"}],"container-title":["Lecture Notes in Computer Science","Advanced Information Systems Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-44885-4_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T13:48:30Z","timestamp":1558964910000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-44885-4_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642387081","9783642387098"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-44885-4_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}