diff --git a/Thesis_Docs/Nikkhah_Nasab-Aida-Mastersthesis.pdf b/Thesis_Docs/Nikkhah_Nasab-Aida-Mastersthesis.pdf index 57e9e936479246e3583161d00b5b90b6c25469c6..873304bdcbf645d0de5953d5e7ad1eff6062a642 100644 Binary files a/Thesis_Docs/Nikkhah_Nasab-Aida-Mastersthesis.pdf and b/Thesis_Docs/Nikkhah_Nasab-Aida-Mastersthesis.pdf differ diff --git a/Thesis_Docs/main.tex b/Thesis_Docs/main.tex index 813ccdc38d692f0afc26f8e6c5aaf6a37a739de3..4afe064800232d3a6e123726f5435ede8fc5a760 100644 --- a/Thesis_Docs/main.tex +++ b/Thesis_Docs/main.tex @@ -31,7 +31,7 @@ Advanced Persistent Threats (APTs) represent one of the most sophisticated and d \begin{figure} \centering \includegraphics[width=\textwidth]{../Thesis_Docs/media/apt_attack_lifecycle.png} - \caption{APT attack lifecycle \cite{charan2021dmapt}} + \caption{7 phases of APT attack lifecycle \cite{charan2021dmapt}} \label{fig:apt_attack_lifecycle} \end{figure}