{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T15:45:59Z","timestamp":1773330359566,"version":"3.50.1"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1109\/acosis.2016.7843932","type":"proceedings-article","created":{"date-parts":[[2017,2,9]],"date-time":"2017-02-09T16:43:51Z","timestamp":1486658631000},"page":"1-6","source":"Crossref","is-referenced-by-count":24,"title":["Advanced Persistent Threat: New analysis driven by life cycle phases and their challenges"],"prefix":"10.1109","author":[{"given":"Brahim I D","family":"Messaoud","sequence":"first","affiliation":[]},{"given":"Karim","family":"Guennoun","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Wahbi","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Sadik","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","article-title":"Protecting the network data trumps employee privacy","author":"armerding","year":"2015","journal-title":"CXO Media Inc"},{"key":"ref31","article-title":"Best Practices and Success Stories for User Behavior Analytics","author":"litan","year":"2015","journal-title":"Gartner Inc"},{"key":"ref30","article-title":"User behavioral analytics tools can thwart security attacks |Nemertes Research","author":"johnson","year":"2015","journal-title":"Nemertes Research"},{"key":"ref10","article-title":"Die Lage der IT-Sicherheit in Deutschland 2015","year":"2015","journal-title":"Bundesamt f&#x00FC;r Sicherheit in der Informationstechnik"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.4018\/ijisp.2014010101"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(14)70040-6"},{"key":"ref13","first-page":"54","article-title":"Targeted Cyberattacks: A Superset of Advanced Persistent Threats","volume":"11","author":"sood","year":"2013","journal-title":"IEEE Security & Privacy"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecurity.2012.14"},{"key":"ref15","article-title":"Detecting and Preventing Data Exfiltration","year":"2014"},{"key":"ref16","article-title":"CAPEC - Common Attack Pattern Enumeration and Classification (CAPEC)","year":"0"},{"key":"ref17","article-title":"APT Group Embeds C&C Data on TechNet Pages | Threatpost","author":"michael","year":"2015","journal-title":"Kaspersky Lab Security"},{"key":"ref18","article-title":"How to detect malicious covert communications in today's networks","year":"2015","journal-title":"Tech Rep"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.12.003"},{"key":"ref28","article-title":"Security Leaders Must Address Threats From Rising SSL Traffic","author":"d'hoinne","year":"2013","journal-title":"Gartner Inc"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(11)70086-1"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-013-1487-8"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2013.32"},{"key":"ref6","article-title":"The APT Lifecycle and its Log Trail","year":"2013","journal-title":"Tech Rep"},{"key":"ref29","article-title":"Analytics and Intelligence Survey 2014 |SANS Institute Reading Room site","author":"dave","year":"2014","journal-title":"Tech Rep"},{"key":"ref5","first-page":"80","article-title":"Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains","volume":"1","author":"hutchins","year":"2011","journal-title":"Leading Issues in Information Warfare & Security Research"},{"key":"ref8","article-title":"Post-Intrusion Report from Vectra Networks","year":"2014","journal-title":"Tech Rep"},{"key":"ref7","article-title":"2014 Threat Report","year":"2014","journal-title":"Tech Rep"},{"key":"ref2","article-title":"M-Trends 2015 A VIEW FROM THE FRONT LINES","year":"2014","journal-title":"Tech Rep"},{"key":"ref9","article-title":"Breaking the Kill Chain: Stopping Data Breaches with Privileged Access Management | CA Technologies","author":"gardner","year":"2015"},{"key":"ref1","article-title":"2015 THREAT REPORT","year":"2015","journal-title":"Tech Rep"},{"key":"ref20","article-title":"Kaspersky Security Bulletin 2014. A Look into the APT Crystal Ball - Securelist","author":"raiu","year":"2014","journal-title":"Kaspersky Lab"},{"key":"ref22","article-title":"Advanced Persistent Threat (APT) Protection - Market Quadrant 2015","year":"2015"},{"key":"ref21","article-title":"Five Styles of Advanced Threat Defense","author":"orans","year":"2013","journal-title":"Gartner Inc"},{"key":"ref24","article-title":"Malware-detecting &#x2018;sandboxing&#x2019; technology no silver bullet","author":"messmer","year":"2013"},{"key":"ref23","article-title":"Cool Vendors in Security Intelligence, 2015","author":"wagner","year":"2015","journal-title":"Gartner Inc"},{"key":"ref26","article-title":"Honeypots: The Need of Network Security","author":"kambow","year":"2014"},{"key":"ref25","article-title":"FireEye Exploitation: Project Zero's Vulnerability of the Beast","author":"ormandy","year":"2015"}],"event":{"name":"2016 International Conference on Advanced Communication Systems and Information Security (ACOSIS)","location":"Marrakesh, Morocco","start":{"date-parts":[[2016,10,17]]},"end":{"date-parts":[[2016,10,19]]}},"container-title":["2016 International Conference on Advanced Communication Systems and Information Security (ACOSIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7830757\/7843912\/07843932.pdf?arnumber=7843932","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T17:56:56Z","timestamp":1488391016000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7843932\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/acosis.2016.7843932","relation":{},"subject":[],"published":{"date-parts":[[2016,10]]}}}