These are the sources and citations used to research Machine Learning and Data Analytics. This bibliography was generated on Cite This For Me on

  • Website

    Bell, L.

    APT 30 government hacker group might not be from China | TheINQUIRER

    2015 - the Inquirer

    In-text: (Bell, 2015)

    Your Bibliography: Bell, L., 2015. APT 30 government hacker group might not be from China | TheINQUIRER. [online] http://www.theinquirer.net. Available at: <https://www.theinquirer.net/inquirer/news/2403740/chinese-hacker-group-has-been-spying-on-governments-for-a-decade-says-fireeye> [Accessed 30 June 2018].

  • Website

    Berninger, M. and Sopan, A.

    Reverse Engineering the Analyst: Building Machine Learning Models forthe SOC « Reverse Engineering the Analyst: Building Machine Learning Models forthe SOC

    2018

    In-text: (Berninger and Sopan, 2018)

    Your Bibliography: Berninger, M. and Sopan, A., 2018. Reverse Engineering the Analyst: Building Machine Learning Models forthe SOC « Reverse Engineering the Analyst: Building Machine Learning Models forthe SOC. [online] FireEye. Available at: <https://www.fireeye.com/blog/threat-research/2018/06/build-machine-learning-models-for-the-soc.html> [Accessed 30 June 2018].

  • Website

    Boland, B.

    APT30 and Lessons for India By Bryce Boland, APAC CTO, FireEye, Inc., FireEye, Inc.

    2018

    In-text: (Boland, 2018)

    Your Bibliography: Boland, B., 2018. APT30 and Lessons for India By Bryce Boland, APAC CTO, FireEye, Inc., FireEye, Inc.. [online] Business-process-management.cioreviewindia.com. Available at: <https://business-process-management.cioreviewindia.com/cioviewpoint/apt30-and-lessons-for-india-nid-1595-cid-1.html> [Accessed 30 June 2018].

  • Website

    Dogra, R.

    FireEye warns of APT 30 cyber espionage operation

    2015

    In-text: (Dogra, 2015)

    Your Bibliography: Dogra, R., 2015. FireEye warns of APT 30 cyber espionage operation. [online] TechSpective. Available at: <https://techspective.net/2015/04/14/fireeye-warns-of-apt-30-cyber-espionage-operation/> [Accessed 30 June 2018].

  • Website

    Advanced Persistent Threat Groups | FireEye

    2018

    In-text: (Advanced Persistent Threat Groups | FireEye, 2018)

    Your Bibliography: FireEye. 2018. Advanced Persistent Threat Groups | FireEye. [online] Available at: <https://www.fireeye.com/current-threats/apt-groups.html> [Accessed 30 June 2018].

  • Website

    Paganini, P.

    APT30 behind a long-running cyber espionage campaign

    2015

    In-text: (Paganini, 2015)

    Your Bibliography: Paganini, P., 2015. APT30 behind a long-running cyber espionage campaign. [online] Security Affairs. Available at: <https://securityaffairs.co/wordpress/35927/hacking/apt30-cyber-espionage.html> [Accessed 30 June 2018].

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Quick and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use plagiarism checker
  • ✔ Create and edit multiple bibliographies
Join