{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T08:56:53Z","timestamp":1758704213190,"version":"3.28.0"},"reference-count":45,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/icacci.2015.7275911","type":"proceedings-article","created":{"date-parts":[[2015,9,28]],"date-time":"2015-09-28T17:27:30Z","timestamp":1443461250000},"page":"2001-2009","source":"Crossref","is-referenced-by-count":25,"title":["An efficient classification model for detecting advanced persistent threat"],"prefix":"10.1109","author":[{"given":"Saranya","family":"Chandran","sequence":"first","affiliation":[]},{"family":"Hrudya P","sequence":"additional","affiliation":[]},{"given":"Prabaharan","family":"Poornachandran","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"A First Course in Mathematical Modeling","year":"2013","author":"giordano","key":"ref39"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2014.53"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SecTech.2008.35"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2013.32"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1109\/3PGCIC.2014.41","article-title":"A Network Gene-Based Framework for Detecting Advanced Persistent Threats","author":"wang","year":"2014","journal-title":"P2P Parallel Grid Cloud and Internet Computing (3PGCIC) 2014 Ninth International Conference on"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ISBAST.2014.7013108"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMMST.2014.6992342"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2014.94"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICT4M.2014.7020648"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SCIS-ISIS.2014.7044836"},{"journal-title":"Evasive Tactics Terminator RAT FireEye","year":"2013","key":"ref10"},{"key":"ref40","first-page":"123","volume":"26","author":"breiman","year":"0","journal-title":"Bagging Predictors Machine Learning"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SIECPC.2013.6551028"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecurity.2012.16"},{"key":"ref13","first-page":"842","article-title":"A Markov multi-phase transferable belief model: An application for predicting data exfiltration APTs","author":"ioannou","year":"2013","journal-title":"Information Fusion (FUSION) 2013 16th International Conference On"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2013.6691646"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2014.6890946"},{"journal-title":"SANS Institute InfoSec Reading Room A Detailed Analysis of an Advanced Persistent Threat Malware33814 pdf","year":"2014","key":"ref16"},{"key":"ref17","article-title":"A Theoretical Model for Detection of Advanced Persistent Threat in Networks and Systems Using a Finite Angular State Velocity Machine (FASTDVM)","volume":"3","year":"2014","journal-title":"International Journal on Computational Science &amp; Applications"},{"journal-title":"Random Trees OpenCV 2 4 9 0 documentation","year":"2014","key":"ref18"},{"journal-title":"DELL Secure Works Counter Threat Unit research 2012","article-title":"Life cycle_of_an_APT","year":"2014","key":"ref19"},{"key":"ref28","article-title":"Advanced Persistent Threat Attack Detection: An Overview","volume":"4","author":"ghafir","year":"2014","journal-title":"International Journal of Advancements in Computer Networks and Its Security-IJCNS"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2013.6698980"},{"year":"2014","key":"ref27","article-title":"Persistent threats and how to monitor and deter them"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-004-0044-x"},{"key":"ref6","article-title":"Mathematical models on computer viruses","author":"bimal kumar","year":"2006","journal-title":"Birla Institute of Technology and Science Mathematics Group"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2011.6112333"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSurv.2013.6548565"},{"key":"ref8","article-title":"Concerning &#x201C;Modeling&#x201D; of Computer Security Concerning Trusted Information Systems","author":"elliott bell","year":"1988","journal-title":"IEEE Inc"},{"key":"ref7","first-page":"161","article-title":"Model of trust management based on finite state machine","author":"zhu","year":"2012","journal-title":"Cyber Security Cyber Warfare and Digital Forensic (CyberSec) 2012 International Conference on"},{"journal-title":"Daniel Lawson An Introduction to Mathematical Modelling","year":"0","key":"ref2"},{"journal-title":"Advanced Persistent Threat Awareness 2014 - white paper","year":"0","key":"ref9"},{"key":"ref1","article-title":"Mathematical Challenges in Cybersecurity","author":"dunlavy","year":"2009","journal-title":"Sandia Report"},{"key":"ref20","article-title":"Modeling Malicious Activities in Cyber Space","author":"yu1","year":"0","journal-title":"1 3 Deakin University 2 Central South University"},{"key":"ref45","article-title":"Reducing False Alarm Using Hybrid Intrusion Detection Based on X-means Clustering and Random Forest","volume":"68","author":"juma","year":"2014","journal-title":"Journal of Theoretical and Applied Information Technology"},{"article-title":"A First Course in Mathematical Modelling Fifth edition","year":"0","author":"giordano","key":"ref22"},{"journal-title":"A websense white paper on Advanced Persistent Threat and other Advanced Attacks","year":"0","key":"ref21"},{"key":"ref42","first-page":"1545","volume":"9","author":"amit","year":"0","journal-title":"[1997] Shape quantization and recognition with randomized trees Neural Computation"},{"journal-title":"Cyber flow Analytics A nextgeneration approach to fighting Advanced Persistent Threats in cyber espionage","year":"2014","key":"ref24"},{"key":"ref41","first-page":"532","volume":"45","author":"breiman","year":"2001","journal-title":"RandomForest"},{"key":"ref23","article-title":"Secure Computer Systems: Mathematical Foundations","volume":"i","author":"elliott bell","year":"1973","journal-title":"November 1996 An electronic reconstruction by Len LaPadula of the original MITRE Technical Report 2547"},{"key":"ref44","first-page":"1247","volume":"2014","author":"chai","year":"0","journal-title":"Root MeanSquare Error (RMSE) or Mean Absolute Error (MAE)? - Arguments Against Avoiding RMSE in the Literature"},{"journal-title":"Introduction to decision trees and random forests Ned Horning American Museum of Natural History's Center for Biodiversity and Conservation","year":"0","key":"ref26"},{"journal-title":"Metric International version Calculus","year":"2008","author":"stewart","key":"ref43"},{"year":"2014","key":"ref25","article-title":"Advanced Persistent Threat: A brief description"}],"event":{"name":"2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","start":{"date-parts":[[2015,8,10]]},"location":"Kochi, India","end":{"date-parts":[[2015,8,13]]}},"container-title":["2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7259950\/7275573\/07275911.pdf?arnumber=7275911","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T16:23:28Z","timestamp":1498235008000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7275911\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/icacci.2015.7275911","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}