-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathQueries.txt
23 lines (16 loc) · 3.33 KB
/
Queries.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
Query 1 -
TITLE-ABS-KEY ( advanced AND persistent AND threat ) AND ( LIMIT-TO ( LANGUAGE , "English" ) )
Query 2 -
TITLE-ABS-KEY ( advanced AND persistent AND attack ) AND ( LIMIT-TO ( LANGUAGE , "English" ) )
Query 3 -
TITLE-ABS-KEY ( apt ) AND ( LIMIT-TO ( LANGUAGE , "English" ) ) AND ( LIMIT-TO ( EXACTKEYWORD , "APT" ) OR LIMIT-TO ( EXACTKEYWORD , "Network Security" ) OR LIMIT-TO ( EXACTKEYWORD , "Algorithms" ) OR LIMIT-TO ( EXACTKEYWORD , "Computer Crime" ) OR LIMIT-TO ( EXACTKEYWORD , "Mathematical Models" ) OR LIMIT-TO ( EXACTKEYWORD , "Malware" ) OR LIMIT-TO ( EXACTKEYWORD , "Artificial Intelligence" ) OR LIMIT-TO ( EXACTKEYWORD , "Learning Systems" ) OR LIMIT-TO ( EXACTKEYWORD , "Advanced Persistent Threat" ) OR LIMIT-TO ( EXACTKEYWORD , "Intrusion Detection" ) OR LIMIT-TO ( EXACTKEYWORD , "Security Of Data" ) OR LIMIT-TO ( EXACTKEYWORD , "Machine Learning" ) OR LIMIT-TO ( EXACTKEYWORD , "Internet Of Things" ) OR LIMIT-TO ( EXACTKEYWORD , "Neural Networks" ) OR LIMIT-TO ( EXACTKEYWORD , "Computer Software" ) OR LIMIT-TO ( EXACTKEYWORD , "Problem Solving" ) OR LIMIT-TO ( EXACTKEYWORD , "Big Data" ) OR LIMIT-TO ( EXACTKEYWORD , "Computation Theory" ) OR LIMIT-TO ( EXACTKEYWORD , "Cyber Security" ) OR LIMIT-TO ( EXACTKEYWORD , "Efficiency" ) OR LIMIT-TO ( EXACTKEYWORD , "Game Theory" ) OR LIMIT-TO ( EXACTKEYWORD , "Cost Effectiveness" ) OR LIMIT-TO ( EXACTKEYWORD , "Cyber-attacks" ) OR LIMIT-TO ( EXACTKEYWORD , "Learning Algorithms" ) OR LIMIT-TO ( EXACTKEYWORD , "Advanced Persistent Threats" ) OR LIMIT-TO ( EXACTKEYWORD , "Security" ) OR LIMIT-TO ( EXACTKEYWORD , "Real Time Systems" ) OR LIMIT-TO ( EXACTKEYWORD , "Complex Networks" ) OR LIMIT-TO ( EXACTKEYWORD , "Diagnosis" ) OR LIMIT-TO ( EXACTKEYWORD , "Internet" ) OR LIMIT-TO ( EXACTKEYWORD , "Personal Computing" ) OR LIMIT-TO ( EXACTKEYWORD , "Cryptography" ) OR LIMIT-TO ( EXACTKEYWORD , "Cloud Computing" ) OR LIMIT-TO ( EXACTKEYWORD , "Crime" ) OR LIMIT-TO ( EXACTKEYWORD , "Network Architecture" ) OR LIMIT-TO ( EXACTKEYWORD , "Security Systems" ) OR LIMIT-TO ( EXACTKEYWORD , "Wireless Telecommunication Systems" ) OR LIMIT-TO ( EXACTKEYWORD , "Internet Protocols" ) OR LIMIT-TO ( EXACTKEYWORD , "Computers" ) )
Query 4 -
TITLE-ABS-KEY ( advanced AND persistent AND theory ) AND ( LIMIT-TO ( LANGUAGE , "English" ) )
Query 5 -
TITLE-ABS-KEY ( apt AND industrial AND control AND systems ) AND ( LIMIT-TO ( LANGUAGE , "English" ) )
Query 6 -
TITLE-ABS-KEY ( targeted AND malware ) AND ( LIMIT-TO ( EXACTKEYWORD , "APT" ) OR LIMIT-TO ( EXACTKEYWORD , "Advanced Persistent Threat" ) )
Query 7 -
TITLE-ABS-KEY ( state AND sponsored AND cyber AND attacks ) AND ( LIMIT-TO ( EXACTKEYWORD , "APT" ) OR LIMIT-TO ( EXACTKEYWORD , "APT Footprinting" ) OR LIMIT-TO ( EXACTKEYWORD , "APT28" ) OR LIMIT-TO ( EXACTKEYWORD , "APTs" ) OR LIMIT-TO ( EXACTKEYWORD , "Advance Persistent Threat" ) OR LIMIT-TO ( EXACTKEYWORD , "Advanced Persistent Attack" ) OR LIMIT-TO ( EXACTKEYWORD , "Advanced Persistent Threats" ) )
Query 8 -
TITLE-ABS-KEY ( targeted AND cyber AND attacks ) AND ( LIMIT-TO ( EXACTKEYWORD , "APT" ) OR LIMIT-TO ( EXACTKEYWORD , "Advanced Persistent Threat" ) OR LIMIT-TO ( EXACTKEYWORD , "Advanced Persistent Threats" ) )