{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T13:40:07Z","timestamp":1762177207147,"version":"3.37.3"},"publisher-location":"Singapore","reference-count":12,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811391897"},{"type":"electronic","value":"9789811391903"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-9190-3_7","type":"book-chapter","created":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T13:02:55Z","timestamp":1562763775000},"page":"76-81","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Evolution of Advanced Persistent Threat (APT) Attacks and Actors"],"prefix":"10.1007","author":[{"given":"Chia-Mei","family":"Chen","sequence":"first","affiliation":[]},{"given":"Gu-Hsin","family":"Lai","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8210-9381","authenticated-orcid":false,"given":"Dan-Wei","family":"Wen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"key":"7_CR1","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.cose.2017.08.005","volume":"72","author":"A Lemay","year":"2018","unstructured":"Lemay, A., Calvet, J., Menet, F., Fernandez, J.M.: Survey of publicly available reports on advanced persistent threat actors. Comput. Secur. 72, 26\u201359 (2018)","journal-title":"Comput. Secur."},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Li, F., Lai, A., Ddl, D.: Evidence of Advanced Persistent Threat: A case study of malware for political espionage. In: 6th International Conference on Malicious and Unwanted Software, pp. 102\u2013109 (2011)","DOI":"10.1109\/MALWARE.2011.6112333"},{"key":"7_CR3","unstructured":"Mandiant: APT1: Exposing One of China\u2019s Cyber Espionage Units (2013). \n                    https:\/\/www.fireeye.com\/content\/dam\/fireeye-www\/services\/pdfs\/mandiant-apt1-report.pdf\n                    \n                  . Accessed 1 Mar 2018"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Ussath, M., Jaeger, D., Feng, C., Meinel, C.: Advanced persistent threats: behind the scenes. In: 2016 Annual Conference on Information Science and Systems (CISS), pp. 181\u2013186 (2016)","DOI":"10.1109\/CISS.2016.7460498"},{"key":"7_CR5","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/j.comnet.2016.05.018","volume":"109","author":"M Marchetti","year":"2016","unstructured":"Marchetti, M., Pierazzi, F., Colajanni, M., Guido, A.: Analysis of high volumes of network traffic for Advanced Persistent Threat detection. Comput. Netw. 109, 127\u2013141 (2016)","journal-title":"Comput. Netw."},{"key":"7_CR6","unstructured":"Nelson, R.R., Winter, S.: An Evolution Theory of Economic. Change Press (1982)"},{"key":"7_CR7","unstructured":"Osborne, C.: Most companies take over six months to detect data breaches. \n                    https:\/\/www.zdnet.com\/article\/businesses-take-over-six-months-to-detect-data-breaches\/\n                    \n                  . Accessed 20 Feb 2018"},{"key":"7_CR8","unstructured":"Aldridge, J.: Remediating Targeted-threat Intrusions (2018). \n                    https:\/\/media.blackhat.com\/bh-us-12\/Briefings\/Aldridge\/BH_US_12_Aldridge_Targeted_Intrustion_WP.pdf\n                    \n                  . Accessed 20 May 2018"},{"key":"7_CR9","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/MSP.2011.158","volume":"9","author":"D Guido","year":"2011","unstructured":"Guido, D.: A case study of intelligence-driven defense. IEEE Secur. Priv. 9, 67\u201370 (2011)","journal-title":"IEEE Secur. Priv."},{"key":"7_CR10","unstructured":"FireEye: APT37: The Overlooked North Korean Actor (2018). \n                    https:\/\/www2.fireeye.com\/rs\/848-DID-242\/images\/rpt_APT37.pdf\n                    \n                  . Accessed 1 Mar 2018"},{"key":"7_CR11","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.techfore.2017.07.027","volume":"130","author":"D Blazquez","year":"2018","unstructured":"Blazquez, D., Domenech, J.: Big data sources and methods for social and economic analyses. Technol. Forecast. Soc. Change 130, 99\u2013113 (2018)","journal-title":"Technol. Forecast. Soc. Change"},{"key":"7_CR12","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/j.dss.2017.11.001","volume":"105","author":"Y Wang","year":"2018","unstructured":"Wang, Y., Xu, W.: Leveraging deep learning with LDA-based text analytics to detect automobile insurance fraud. Decis. Support Syst. 105, 87\u201395 (2018)","journal-title":"Decis. Support Syst."}],"container-title":["Communications in Computer and Information Science","New Trends in Computer Technologies and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-9190-3_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T13:03:44Z","timestamp":1562763824000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-9190-3_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811391897","9789811391903"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-9190-3_7","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Computer Symposium","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Yunlin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taiwan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incosy2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ics2018.yuntech.edu.tw\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}