Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Kill chain

The term kill chain was originally used as a military concept related to the structure of an attack; consisting of target identification, force… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
In spite of being just a few years old, ransomware is quickly becoming a serious threat to our digital infrastructures, data and… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2018
2018
Malware such as banking Trojans are popular with financially-motivated cybercriminals. Detection of banking Trojans remains a… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2018
2018
A cyber kill chain is a traditional model to analyze cyber security threats, whether there is a malware inside a computer system… Expand
Is this relevant?
2018
2018
The sudden rise in the frequency and sophistication of cyber threats has become a hindrance to the steady development of internet… Expand
  • figure 1
  • table 1
  • table 2
  • table 4
  • table 5
Is this relevant?
2016
2016
Over the last 10 years we have seen a continual growth in the number of break-ins at government sites as well as commercial… Expand
  • figure 2
  • figure 1
  • figure 4
  • figure 3
  • figure 5
Is this relevant?
2016
2016
Industrial Control Systems (ICS), which are pervasive in our nation’s critical infrastructures, are becoming increasingly at risk… Expand
  • figure 1
  • table 1
  • table 2
  • figure 2
  • figure 3
Is this relevant?
2015
2015
Recent trends in targeted cyber-attacks has increased the interest of research in the field of cyber security. Such attacks have… Expand
  • figure 1
  • table I
  • table II
  • table III
  • table IV
Is this relevant?
2011
2011
The southern pine beetle (SPB) is a major threat to pine forests in the Southeastern United States, Mexico, and Central America… Expand
  • figure 25.1
  • figure 25.2
  • figure 25.3
  • figure 25.4
  • figure 25.5
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Conventional network defense tools such as intrusion detection systems and anti-virus focus on the vulnerability component of… Expand
Is this relevant?
2009
2009
Abstract : When groups of platforms, sensors, and weapons are able to communicate with each other in real-time, they form a… Expand
  • figure 1
  • table 4
  • figure 4
  • figure 7
Is this relevant?