找回密碼
 To register

QQ登錄

只需一步,快速開(kāi)始

掃一掃,訪問(wèn)微社區(qū)

打印 上一主題 下一主題

Titlebook: Data Science in Cybersecurity and Cyberthreat Intelligence; Leslie F. Sikos,Kim-Kwang Raymond Choo Book 2020 Springer Nature Switzerland A

[復(fù)制鏈接]
查看: 32939|回復(fù): 37
樓主
發(fā)表于 2025-3-21 18:50:19 | 只看該作者 |倒序?yàn)g覽 |閱讀模式
書(shū)目名稱Data Science in Cybersecurity and Cyberthreat Intelligence
編輯Leslie F. Sikos,Kim-Kwang Raymond Choo
視頻videohttp://file.papertrans.cn/264/263126/263126.mp4
概述Presents the state of the art in cybersecurity, and critically reviews existing approaches.Addresses the intersection of two hot topics: cybersecurity and data science.Includes an essential introducti
叢書(shū)名稱Intelligent Systems Reference Library
圖書(shū)封面Titlebook: Data Science in Cybersecurity and Cyberthreat Intelligence;  Leslie F. Sikos,Kim-Kwang Raymond Choo Book 2020 Springer Nature Switzerland A
描述.This book presents a collection of state-of-the-art approaches to utilizing machine learning, formal knowledge bases and rule sets, and semantic reasoning to detect attacks on communication networks, including IoT infrastructures, to automate malicious code detection, to efficiently predict cyberattacks in enterprises, to identify malicious URLs and DGA-generated domain names, and to improve the security of mHealth wearables. This book details how analyzing the likelihood of vulnerability exploitation using machine learning classifiers can offer an alternative to traditional penetration testing solutions. In addition, the book describes a range of techniques that support data aggregation and data fusion to automate data-driven analytics in cyberthreat intelligence, allowing complex and previously unknown cyberthreats to be identified and classified, and countermeasures to be incorporated in novel incident response and intrusion detection mechanisms. .
出版日期Book 2020
關(guān)鍵詞Cybersecurity; Cybersituational Awareness; Cyberthreat Intelligence; Data Science; Artificial Intelligen
版次1
doihttps://doi.org/10.1007/978-3-030-38788-4
isbn_softcover978-3-030-38790-7
isbn_ebook978-3-030-38788-4Series ISSN 1868-4394 Series E-ISSN 1868-4408
issn_series 1868-4394
copyrightSpringer Nature Switzerland AG 2020
The information of publication is updating

書(shū)目名稱Data Science in Cybersecurity and Cyberthreat Intelligence影響因子(影響力)




書(shū)目名稱Data Science in Cybersecurity and Cyberthreat Intelligence影響因子(影響力)學(xué)科排名




書(shū)目名稱Data Science in Cybersecurity and Cyberthreat Intelligence網(wǎng)絡(luò)公開(kāi)度




書(shū)目名稱Data Science in Cybersecurity and Cyberthreat Intelligence網(wǎng)絡(luò)公開(kāi)度學(xué)科排名




書(shū)目名稱Data Science in Cybersecurity and Cyberthreat Intelligence被引頻次




書(shū)目名稱Data Science in Cybersecurity and Cyberthreat Intelligence被引頻次學(xué)科排名




書(shū)目名稱Data Science in Cybersecurity and Cyberthreat Intelligence年度引用




書(shū)目名稱Data Science in Cybersecurity and Cyberthreat Intelligence年度引用學(xué)科排名




書(shū)目名稱Data Science in Cybersecurity and Cyberthreat Intelligence讀者反饋




書(shū)目名稱Data Science in Cybersecurity and Cyberthreat Intelligence讀者反饋學(xué)科排名




單選投票, 共有 0 人參與投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用戶組沒(méi)有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-21 22:21:35 | 只看該作者
板凳
發(fā)表于 2025-3-22 00:34:11 | 只看該作者
地板
發(fā)表于 2025-3-22 06:18:23 | 只看該作者
5#
發(fā)表于 2025-3-22 08:49:37 | 只看該作者
Amrina Ferdous,Md. Abu Shahin,Md. Ayub Alicurity threats is further and further growing. In this chapter, we introduce an approach for identifying hidden security threats by using Uniform Resource Locators (URLs) as an example dataset, with a method that automatically detects malicious URLs by leveraging machine learning techniques. We demo
6#
發(fā)表于 2025-3-22 16:25:17 | 只看該作者
Md. Jahanur Rahman,Md. Al Mehedi Hasans for network attack and anomaly detection. The approach is characterized by several layers of data processing, including extraction and decomposition of datasets, compression of feature vectors, training, and classification. To reduce the dimension of the analyzed feature vectors, principal compone
7#
發(fā)表于 2025-3-22 17:49:54 | 只看該作者
A. Zahiri,H. Md. Azamathulla,Kh. Ghorbanis smart phones and wearables that have been adopted for personal use in everyday life, has produced a demand for utilities that can assist people with achieving goals for a successful lifestyle, i.e., to live healthier and more productive lives. With continued research and development into technolog
8#
發(fā)表于 2025-3-23 00:33:25 | 只看該作者
9#
發(fā)表于 2025-3-23 04:33:36 | 只看該作者
Data Science in Cybersecurity and Cyberthreat Intelligence978-3-030-38788-4Series ISSN 1868-4394 Series E-ISSN 1868-4408
10#
發(fā)表于 2025-3-23 08:23:33 | 只看該作者
https://doi.org/10.1007/978-3-030-38788-4Cybersecurity; Cybersituational Awareness; Cyberthreat Intelligence; Data Science; Artificial Intelligen
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛(ài)論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-27 11:22
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
姜堰市| 北辰区| 安化县| 封开县| 鄂尔多斯市| 灵璧县| 陇西县| 老河口市| 渑池县| 屯留县| 石景山区| 福建省| 中山市| 新野县| 淳安县| 伊川县| 绥棱县| 福清市| 合江县| 大洼县| 七台河市| 武安市| 工布江达县| 乌兰察布市| 革吉县| 渑池县| 临清市| 偏关县| 梁山县| 信阳市| 周宁县| 台中市| 南乐县| 怀远县| 海安县| 志丹县| 文昌市| 贵州省| 闸北区| 礼泉县| 满洲里市|