|
[1]DIGITIMES, ”目標式攻擊日增 網路安全風險加大”, Retrieved from: http://www.digitimes.com.tw/tw/dt/n/shwnws.asp?CnlID=13&packageid=6317&id=0000297255_V0V1AA166L1WDR4ENXV2Y&cat=60&ct=1#ixzz3zyzqsWN0, 2015. [2]TREND LABS, “《APT 攻擊》南韓爆發史上最大駭客攻擊 企業及個人用戶電腦皆停擺”, TREND Micro, Retrieved from: http://blog.trendmicro.com.tw/?p=4524, 2015. [3]J. Scott, and D. Spaniel, “2016 Will be the Year Ransomware Holds America Hostage”, The ICIT Ransomware Report, 2016. Retrieved from: http://icitech.org/wp-content/uploads/2016/03/ICIT-Brief-The-Ransomware-Report2.pdf, 2016. [4]TREND LABS, “Understand and combat advanced persistent threats and targeted attacks”, TREND Micro, Retrieved from: http://www.trendmicro.com/us/enterprise/challenges/advance-targeted-attacks/, 2016. [5]TREND LABS, “ Lateral movement: How Do Threat Actors Move Deeper into Your Network?”, TREND Micro, Retrieved from: http://about-threats.trendmicro.com/cloud-content/us/ent-primers/pdf/tlp_lateral_movement.pdf , 2013. [6]Fireeye, “Fireeye Reveals Rise in Advanced Threat Activities By Iranian-Linked Ajax Security Team in Post Stuxnet Era”, Fireeye 2014 Press Releases, 2014. [7]C. M. Chen, H. W. Hsiao, P. Y. Yang, and Y. H. Ou, “Defending malicious attacks in Cyber Physical Systems”, Cyber-Physical Systems, Networks, and Applications (CPSNA), 2013 IEEE 1st International Conference, pp. 13-18, 2013. [8]M. Sato, A. Sugimoto, N. Hayashi, Y. Isobe, and R. Sasaki,, “Proposal of a Method for Identifying the Infection Route for Targeted Attacks Based on Malware Behavior in a Network”, 2015 Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, pp.40-45, 2015. [9]A. Lai, B. Wu and M. C. Chiu. “Apt Secrets in Asia “,2011HITCON: Apt Secrets in Asia, 2011 Hacks in Taiwan Conference. Retrieved from: http://hitcon.org/hit2011/downloads/06_APT_Secrets_In_Asia.pdf, 2011. [10]Y. F. Huang, “M-Trends 2016”, Taiwan InfoSec Conference 2016, Retrieved from: http://www.ithome.com.tw/news/104529, 2016. [11]A. Botta, W. Donato, V. Persico, and A. Pescapé, “Integration of Cloud computing and Internet of Things: A survey”, International Journal of Future Generation Computer Systems, vol.56, pp.684-700, 2016. [12] 盧沛樺,“你有用銀行APP嗎? 過半銀行APP有資安漏洞”, 天下雜誌,Retrieved from: http://news.ltn.com.tw/news/focus/paper/1012602, 2016. [13]H. Holm, W. R. Flores, M. Nohlberg, and M. Ekstedt, “An Empirical Investigation of the Effect of Target-Related Information in Phishing Attacks” Published in: 2014 IEEE 18th International Enterprise Distributed Object Computing Conference Workshops and Demonstrations, pp. 357-363, 2014. [14]A. K. Sood, and R. J. Enbody, “Targeted cyber attacks: A superset of advanced persistent threats”. IEEE Security & Privacy Magazine 99, pp.54-61, 2012. [15]C.Wu, “認識進階持續性滲透攻擊”, Retrieved from: https://blogs.technet.microsoft.com/twsecurity/2013/07/07/apt/, 2015. [16]Z. Pawlak “Rough Set”, International Journal of Computer and Information Sciences, Vol. 11, No. 5, pp.341-356, 1982. [17]溫坤禮、永井正武、張廷政、溫惠筑, “粗糙集入門與應用”,五南出版社, 2008. [18]T. F. Fan, D. R. Liu, and G. H. Tzeng, “Rough Set-based Logics for Multicriteria decision analysis”, European Journal of Operational Research, Vol. 182, no.1, pp.340-355, 2007. [19]A. K. A. Salam, and A. V. Deorankar, “Assessment on Brain Tumor Detection using Rough Set Theory”, International Journal of Advance Research in Computer Science and Management Studies, Vol. 3(1), pp.240-244, 2015. [20]G. H. Lai, C. W. Chou, C. M. Chen and Y. H. Ou, “Anti-Spam Filter Based on Data Mining and Statistical Test”, Studies in Computational Intelligence_Computer and Information Science 2009, Vol. 208, pp. 179-192, 2009. [21]S. Thaseen, and C. A. Kumar, “Intrusion Detection Model Using Fusion of Chi-Square 4 Feature Selection and Multi Class SVM”, Journal of King Saud University - Computer and Information Sciences, 2016. [22]Y. Li, X. B. Liu, and J. Yu, “A Bayesian Chi-squared Test for Hypothesis Testing”, Journal of Econometrics, Vol.189, pp.54-69, 2015. [23]L. D. Prochazkova, and M. Hromada, “The Security Risks Associated with Attacks on Soft Targets of State”, Published in: Military Technologies (ICMT), 2015 International Conference on, pp.1-4, 2015. [24]X. Kong, X. Liu, R. Shi, and K. Y. Lee, “Wind Speed Prediction Using Reduced Support Vector Machines With Feature Selection” Neurocomputing, Vol. 169, pp.449-456, 2015. [25]N. Wang, S. Wang, and Q. Jia, “The Method to Reduce Identification Feature of Different Voltage Sag Disturbance Source Based on Principal Component Analysis” Published in: Transportation Electrification Asia-Pacific (ITEC Asia-Pacific), 2014 IEEE Conference, pp.1-6, 2014. [26]TREND LABS 趨勢科技全球技術支援與研發中心,” APT 攻擊有何變化?政府機關依然是APT 攻擊最愛,台灣列入熱門目標”, Retrieved from: http://blog.trendmicro.com.tw/?p=12094. [27]M. Rouse, “Watering Hole Attack”, TechTarget, Retrieved from: http://searchsecurity.techtarget.com/definition/watering-hole-attack,2015. [28]J. Gardiner, M. Cova, and S. Nagaraja, “Command & Control: Understanding, Denying and Detecting”, Centre for the Protection of National Infrastructure, 2014.
|