_version_ |
1809900675611492352
|
annif_keywords_txtF_mv |
People's Republic of China
tactics
action
pandas
data security
|
annif_uris_txtF_mv |
http://www.yso.fi/onto/yso/p104984
http://www.yso.fi/onto/yso/p4631
http://www.yso.fi/onto/yso/p8090
http://www.yso.fi/onto/yso/p10391
http://www.yso.fi/onto/yso/p5479
|
author |
Alaverronen, Sami
Pohjola, Jussi
|
author2 |
Informaatioteknologian tiedekunta
Faculty of Information Technology
Informaatioteknologia
Information Technology
Jyväskylän yliopisto
University of Jyväskylä
Kyberturvallisuus
601
|
author_facet |
Alaverronen, Sami
Pohjola, Jussi
Informaatioteknologian tiedekunta
Faculty of Information Technology
Informaatioteknologia
Information Technology
Jyväskylän yliopisto
University of Jyväskylä
Kyberturvallisuus
601
Alaverronen, Sami
Pohjola, Jussi
|
author_sort |
Alaverronen, Sami
|
building |
Jyväskylän yliopisto
JYX-julkaisuarkisto
|
datasource_str_mv |
jyx
|
department_txtF |
Informaatioteknologia
|
faculty_txtF |
Informaatioteknologian tiedekunta
|
first_indexed |
2023-10-18T20:41:45Z
|
format |
Pro gradu
|
format_ext_str_mv |
Opinnäyte
Maisterivaiheen työ
|
free_online_boolean |
1
|
fullrecord |
<?xml version="1.0"?>
<qualifieddc schemaLocation="http://purl.org/dc/terms/ http://dublincore.org/schemas/xmls/qdc/2006/01/06/dcterms.xsd http://purl.org/dc/elements/1.1/ http://dublincore.org/schemas/xmls/qdc/2006/01/06/dc.xsd"><title>Pandas in action : analysis of China related advanced persistent threat actors’ tactics, techniques & procedures</title><creator>Alaverronen, Sami</creator><creator>Pohjola, Jussi</creator><contributor type="tiedekunta" lang="fi">Informaatioteknologian tiedekunta</contributor><contributor type="tiedekunta" lang="en">Faculty of Information Technology</contributor><contributor type="laitos" lang="fi">Informaatioteknologia</contributor><contributor type="laitos" lang="en">Information Technology</contributor><contributor type="yliopisto" lang="fi">Jyväskylän yliopisto</contributor><contributor type="yliopisto" lang="en">University of Jyväskylä</contributor><contributor type="oppiaine" lang="fi">Kyberturvallisuus</contributor><contributor type="oppiaine" lang="en">Kyberturvallisuus</contributor><contributor type="oppiainekoodi">601</contributor><subject type="other">China</subject><subject type="other">advanced persistent threat</subject><subject type="other">cyber threat intelligence</subject><subject type="other">cyber kill chain</subject><subject type="other">MITRE ATT&CK Framework</subject><subject type="yso">sisällönanalyysi</subject><subject type="yso">kyberturvallisuus</subject><subject type="yso">kybersodankäynti</subject><subject type="yso">content analysis</subject><subject type="yso">cyber security</subject><subject type="yso">cyberwarfare</subject><available>2023-10-18T06:00:41Z</available><issued>2023</issued><type lang="en">Master’s thesis</type><type lang="fi">Pro gradu -tutkielma</type><identifier type="uri">https://jyx.jyu.fi/handle/123456789/90108</identifier><identifier type="urn">URN:NBN:fi:jyu-202310186146</identifier><language type="iso">en</language><rights>In Copyright</rights><rights type="copyright">© The Author(s)</rights><rights type="accesslevel">openAccess</rights><rights type="url">https://rightsstatements.org/page/InC/1.0/</rights><permaddress type="urn">http://www.urn.fi/URN:NBN:fi:jyu-202310186146</permaddress><file bundle="ORIGINAL" href="https://jyx.jyu.fi/bitstream/123456789/90108/1/URN%3aNBN%3afi%3ajyu-202310186146.pdf" name="URN:NBN:fi:jyu-202310186146.pdf" type="application/pdf" length="3623282" sequence="1"/><recordID>123456789_90108</recordID></qualifieddc>
|
id |
jyx.123456789_90108
|
language |
eng
|
last_indexed |
2024-09-03T10:51:02Z
|
main_date |
2023-01-01T00:00:00Z
|
main_date_str |
2023
|
online_boolean |
1
|
online_urls_str_mv |
{"url":"https:\/\/jyx.jyu.fi\/bitstream\/123456789\/90108\/1\/URN%3aNBN%3afi%3ajyu-202310186146.pdf","text":"URN:NBN:fi:jyu-202310186146.pdf","source":"jyx","mediaType":"application\/pdf"}
|
oppiainekoodi_txtF |
601
|
publication_first_indexed |
2023-10-18T20:41:45Z
|
publishDate |
2023
|
record_format |
qdc
|
source_str_mv |
jyx
|
spellingShingle |
Alaverronen, Sami
Pohjola, Jussi
Pandas in action : analysis of China related advanced persistent threat actors’ tactics, techniques & procedures
China
advanced persistent threat
cyber threat intelligence
cyber kill chain
MITRE ATT&CK Framework
sisällönanalyysi
kyberturvallisuus
kybersodankäynti
content analysis
cyber security
cyberwarfare
|
subject_txtF |
Kognitiotiede
|
thumbnail |
https://jyu.finna.fi/Cover/Show?source=Solr&id=jyx.123456789_90108&index=0&size=large
|
title |
Pandas in action : analysis of China related advanced persistent threat actors’ tactics, techniques & procedures
|
title_full |
Pandas in action : analysis of China related advanced persistent threat actors’ tactics, techniques & procedures
|
title_fullStr |
Pandas in action : analysis of China related advanced persistent threat actors’ tactics, techniques & procedures
Pandas in action : analysis of China related advanced persistent threat actors’ tactics, techniques & procedures
|
title_full_unstemmed |
Pandas in action : analysis of China related advanced persistent threat actors’ tactics, techniques & procedures
Pandas in action : analysis of China related advanced persistent threat actors’ tactics, techniques & procedures
|
title_short |
Pandas in action
|
title_sort |
pandas in action analysis of china related advanced persistent threat actors tactics techniques procedures
|
title_sub |
analysis of China related advanced persistent threat actors’ tactics, techniques & procedures
|
title_txtP |
Pandas in action : analysis of China related advanced persistent threat actors’ tactics, techniques & procedures
|
topic |
China
advanced persistent threat
cyber threat intelligence
cyber kill chain
MITRE ATT&CK Framework
sisällönanalyysi
kyberturvallisuus
kybersodankäynti
content analysis
cyber security
cyberwarfare
|
topic_facet |
China
MITRE ATT&CK Framework
advanced persistent threat
content analysis
cyber kill chain
cyber security
cyber threat intelligence
cyberwarfare
kybersodankäynti
kyberturvallisuus
sisällönanalyysi
|
url |
https://jyx.jyu.fi/handle/123456789/90108
http://www.urn.fi/URN:NBN:fi:jyu-202310186146
|
work_keys_str_mv |
AT alaverronensami pandasinactionanalysisofchinarelatedadvancedpersistentthreatactorstacticstechniq
|