This document discusses techniques for detecting advanced persistent threats (APTs). It provides examples of APT attacks and outlines strategies for analyzing event sequences and symbol co-occurrences in large datasets to identify anomalous patterns that can reveal APT activity. Statistical tests like log-likelihood ratio tests are recommended for finding interesting coincidences in tables of symbol co-occurrence data that may indicate security threats.