找回密碼
 To register

QQ登錄

只需一步,快速開(kāi)始

掃一掃,訪問(wèn)微社區(qū)

打印 上一主題 下一主題

Titlebook: Data Science in Cybersecurity and Cyberthreat Intelligence; Leslie F. Sikos,Kim-Kwang Raymond Choo Book 2020 Springer Nature Switzerland A

[復(fù)制鏈接]
查看: 32932|回復(fù): 37
樓主
發(fā)表于 2025-3-21 18:50:19 | 只看該作者 |倒序?yàn)g覽 |閱讀模式
書(shū)目名稱Data Science in Cybersecurity and Cyberthreat Intelligence
編輯Leslie F. Sikos,Kim-Kwang Raymond Choo
視頻videohttp://file.papertrans.cn/264/263126/263126.mp4
概述Presents the state of the art in cybersecurity, and critically reviews existing approaches.Addresses the intersection of two hot topics: cybersecurity and data science.Includes an essential introducti
叢書(shū)名稱Intelligent Systems Reference Library
圖書(shū)封面Titlebook: Data Science in Cybersecurity and Cyberthreat Intelligence;  Leslie F. Sikos,Kim-Kwang Raymond Choo Book 2020 Springer Nature Switzerland A
描述.This book presents a collection of state-of-the-art approaches to utilizing machine learning, formal knowledge bases and rule sets, and semantic reasoning to detect attacks on communication networks, including IoT infrastructures, to automate malicious code detection, to efficiently predict cyberattacks in enterprises, to identify malicious URLs and DGA-generated domain names, and to improve the security of mHealth wearables. This book details how analyzing the likelihood of vulnerability exploitation using machine learning classifiers can offer an alternative to traditional penetration testing solutions. In addition, the book describes a range of techniques that support data aggregation and data fusion to automate data-driven analytics in cyberthreat intelligence, allowing complex and previously unknown cyberthreats to be identified and classified, and countermeasures to be incorporated in novel incident response and intrusion detection mechanisms. .
出版日期Book 2020
關(guān)鍵詞Cybersecurity; Cybersituational Awareness; Cyberthreat Intelligence; Data Science; Artificial Intelligen
版次1
doihttps://doi.org/10.1007/978-3-030-38788-4
isbn_softcover978-3-030-38790-7
isbn_ebook978-3-030-38788-4Series ISSN 1868-4394 Series E-ISSN 1868-4408
issn_series 1868-4394
copyrightSpringer Nature Switzerland AG 2020
The information of publication is updating

書(shū)目名稱Data Science in Cybersecurity and Cyberthreat Intelligence影響因子(影響力)




書(shū)目名稱Data Science in Cybersecurity and Cyberthreat Intelligence影響因子(影響力)學(xué)科排名




書(shū)目名稱Data Science in Cybersecurity and Cyberthreat Intelligence網(wǎng)絡(luò)公開(kāi)度




書(shū)目名稱Data Science in Cybersecurity and Cyberthreat Intelligence網(wǎng)絡(luò)公開(kāi)度學(xué)科排名




書(shū)目名稱Data Science in Cybersecurity and Cyberthreat Intelligence被引頻次




書(shū)目名稱Data Science in Cybersecurity and Cyberthreat Intelligence被引頻次學(xué)科排名




書(shū)目名稱Data Science in Cybersecurity and Cyberthreat Intelligence年度引用




書(shū)目名稱Data Science in Cybersecurity and Cyberthreat Intelligence年度引用學(xué)科排名




書(shū)目名稱Data Science in Cybersecurity and Cyberthreat Intelligence讀者反饋




書(shū)目名稱Data Science in Cybersecurity and Cyberthreat Intelligence讀者反饋學(xué)科排名




單選投票, 共有 0 人參與投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用戶組沒(méi)有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-21 22:21:35 | 只看該作者
板凳
發(fā)表于 2025-3-22 00:34:11 | 只看該作者
地板
發(fā)表于 2025-3-22 06:18:23 | 只看該作者
5#
發(fā)表于 2025-3-22 08:49:37 | 只看該作者
Amrina Ferdous,Md. Abu Shahin,Md. Ayub Alicurity threats is further and further growing. In this chapter, we introduce an approach for identifying hidden security threats by using Uniform Resource Locators (URLs) as an example dataset, with a method that automatically detects malicious URLs by leveraging machine learning techniques. We demo
6#
發(fā)表于 2025-3-22 16:25:17 | 只看該作者
Md. Jahanur Rahman,Md. Al Mehedi Hasans for network attack and anomaly detection. The approach is characterized by several layers of data processing, including extraction and decomposition of datasets, compression of feature vectors, training, and classification. To reduce the dimension of the analyzed feature vectors, principal compone
7#
發(fā)表于 2025-3-22 17:49:54 | 只看該作者
A. Zahiri,H. Md. Azamathulla,Kh. Ghorbanis smart phones and wearables that have been adopted for personal use in everyday life, has produced a demand for utilities that can assist people with achieving goals for a successful lifestyle, i.e., to live healthier and more productive lives. With continued research and development into technolog
8#
發(fā)表于 2025-3-23 00:33:25 | 只看該作者
9#
發(fā)表于 2025-3-23 04:33:36 | 只看該作者
Data Science in Cybersecurity and Cyberthreat Intelligence978-3-030-38788-4Series ISSN 1868-4394 Series E-ISSN 1868-4408
10#
發(fā)表于 2025-3-23 08:23:33 | 只看該作者
https://doi.org/10.1007/978-3-030-38788-4Cybersecurity; Cybersituational Awareness; Cyberthreat Intelligence; Data Science; Artificial Intelligen
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛(ài)論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-27 08:04
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
饶阳县| 贵阳市| 大连市| 辽源市| 治县。| 巴东县| 合川市| 清水县| 定边县| 蓬溪县| 桦川县| 威信县| 闽侯县| 宁化县| 保山市| 黑河市| 色达县| 双辽市| 资源县| 永清县| 鹿邑县| 九龙城区| 宜宾市| 怀安县| 梁山县| 酒泉市| 顺昌县| 深圳市| 祁连县| 浑源县| 海门市| 淮滨县| 义乌市| 高唐县| 蒲江县| 镇安县| 大名县| 桦川县| 临汾市| 伊春市| 三台县|