找回密碼
 To register

QQ登錄

只需一步,快速開(kāi)始

掃一掃,訪問(wèn)微社區(qū)

打印 上一主題 下一主題

Titlebook: Data Science in Cybersecurity and Cyberthreat Intelligence; Leslie F. Sikos,Kim-Kwang Raymond Choo Book 2020 Springer Nature Switzerland A

[復(fù)制鏈接]
查看: 32932|回復(fù): 37
樓主
發(fā)表于 2025-3-21 18:50:19 | 只看該作者 |倒序?yàn)g覽 |閱讀模式
書(shū)目名稱Data Science in Cybersecurity and Cyberthreat Intelligence
編輯Leslie F. Sikos,Kim-Kwang Raymond Choo
視頻videohttp://file.papertrans.cn/264/263126/263126.mp4
概述Presents the state of the art in cybersecurity, and critically reviews existing approaches.Addresses the intersection of two hot topics: cybersecurity and data science.Includes an essential introducti
叢書(shū)名稱Intelligent Systems Reference Library
圖書(shū)封面Titlebook: Data Science in Cybersecurity and Cyberthreat Intelligence;  Leslie F. Sikos,Kim-Kwang Raymond Choo Book 2020 Springer Nature Switzerland A
描述.This book presents a collection of state-of-the-art approaches to utilizing machine learning, formal knowledge bases and rule sets, and semantic reasoning to detect attacks on communication networks, including IoT infrastructures, to automate malicious code detection, to efficiently predict cyberattacks in enterprises, to identify malicious URLs and DGA-generated domain names, and to improve the security of mHealth wearables. This book details how analyzing the likelihood of vulnerability exploitation using machine learning classifiers can offer an alternative to traditional penetration testing solutions. In addition, the book describes a range of techniques that support data aggregation and data fusion to automate data-driven analytics in cyberthreat intelligence, allowing complex and previously unknown cyberthreats to be identified and classified, and countermeasures to be incorporated in novel incident response and intrusion detection mechanisms. .
出版日期Book 2020
關(guān)鍵詞Cybersecurity; Cybersituational Awareness; Cyberthreat Intelligence; Data Science; Artificial Intelligen
版次1
doihttps://doi.org/10.1007/978-3-030-38788-4
isbn_softcover978-3-030-38790-7
isbn_ebook978-3-030-38788-4Series ISSN 1868-4394 Series E-ISSN 1868-4408
issn_series 1868-4394
copyrightSpringer Nature Switzerland AG 2020
The information of publication is updating

書(shū)目名稱Data Science in Cybersecurity and Cyberthreat Intelligence影響因子(影響力)




書(shū)目名稱Data Science in Cybersecurity and Cyberthreat Intelligence影響因子(影響力)學(xué)科排名




書(shū)目名稱Data Science in Cybersecurity and Cyberthreat Intelligence網(wǎng)絡(luò)公開(kāi)度




書(shū)目名稱Data Science in Cybersecurity and Cyberthreat Intelligence網(wǎng)絡(luò)公開(kāi)度學(xué)科排名




書(shū)目名稱Data Science in Cybersecurity and Cyberthreat Intelligence被引頻次




書(shū)目名稱Data Science in Cybersecurity and Cyberthreat Intelligence被引頻次學(xué)科排名




書(shū)目名稱Data Science in Cybersecurity and Cyberthreat Intelligence年度引用




書(shū)目名稱Data Science in Cybersecurity and Cyberthreat Intelligence年度引用學(xué)科排名




書(shū)目名稱Data Science in Cybersecurity and Cyberthreat Intelligence讀者反饋




書(shū)目名稱Data Science in Cybersecurity and Cyberthreat Intelligence讀者反饋學(xué)科排名




單選投票, 共有 0 人參與投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用戶組沒(méi)有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-21 22:21:35 | 只看該作者
板凳
發(fā)表于 2025-3-22 00:34:11 | 只看該作者
地板
發(fā)表于 2025-3-22 06:18:23 | 只看該作者
5#
發(fā)表于 2025-3-22 08:49:37 | 只看該作者
Amrina Ferdous,Md. Abu Shahin,Md. Ayub Alicurity threats is further and further growing. In this chapter, we introduce an approach for identifying hidden security threats by using Uniform Resource Locators (URLs) as an example dataset, with a method that automatically detects malicious URLs by leveraging machine learning techniques. We demo
6#
發(fā)表于 2025-3-22 16:25:17 | 只看該作者
Md. Jahanur Rahman,Md. Al Mehedi Hasans for network attack and anomaly detection. The approach is characterized by several layers of data processing, including extraction and decomposition of datasets, compression of feature vectors, training, and classification. To reduce the dimension of the analyzed feature vectors, principal compone
7#
發(fā)表于 2025-3-22 17:49:54 | 只看該作者
A. Zahiri,H. Md. Azamathulla,Kh. Ghorbanis smart phones and wearables that have been adopted for personal use in everyday life, has produced a demand for utilities that can assist people with achieving goals for a successful lifestyle, i.e., to live healthier and more productive lives. With continued research and development into technolog
8#
發(fā)表于 2025-3-23 00:33:25 | 只看該作者
9#
發(fā)表于 2025-3-23 04:33:36 | 只看該作者
Data Science in Cybersecurity and Cyberthreat Intelligence978-3-030-38788-4Series ISSN 1868-4394 Series E-ISSN 1868-4408
10#
發(fā)表于 2025-3-23 08:23:33 | 只看該作者
https://doi.org/10.1007/978-3-030-38788-4Cybersecurity; Cybersituational Awareness; Cyberthreat Intelligence; Data Science; Artificial Intelligen
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛(ài)論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-27 08:04
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
广水市| 乌拉特前旗| 弋阳县| 黎平县| 平顺县| 渭源县| 鹿泉市| 天峨县| 奇台县| 许昌县| 乌鲁木齐县| 三亚市| 东乌珠穆沁旗| 滦平县| 安陆市| 苏尼特右旗| 武功县| 长海县| 苗栗县| 浑源县| 龙海市| 宜城市| 荔波县| 资源县| 乌兰浩特市| 庆元县| 保康县| 深圳市| 桐梓县| 贡觉县| 辽阳县| 岳池县| 潞西市| 荃湾区| 德清县| 潞城市| 宝鸡市| 三台县| 丹寨县| 冷水江市| 普宁市|