虚假 发表于 2025-3-26 23:45:28

Mobile Forensics: A Bibliometric Analysis,dvances investigators have made over time on the subject, the possible future technologies that could influence more changes in the field of mobile forensics and its impact, covering also the difference between mobile forensics and computer forensics.

大量 发表于 2025-3-27 03:35:55

Emerging from the Cloud: A Bibliometric Analysis of Cloud Forensics Studies,ssment of cloud forensics research trends between 2009 and 2016. Moreover, we provide a classification of cloud forensics process to detect the most profound research areas and highlight remaining challenges.

BUOY 发表于 2025-3-27 06:14:16

Book 2018er threat intelligence concepts against a range of threat actors and threat tools (i.e. ransomware) in cutting-edge technologies, i.e., Internet of Things (IoT), Cloud computing and mobile devices. This book also provides the technical information on cyber-threat detection methods required for the r

狂热文化 发表于 2025-3-27 10:46:19

1568-2633 ne of the first books that focuses on cyber threat intellige.This book provides readers with up-to-date research of emerging cyber threats and defensive mechanisms, which are timely and essential. It covers cyber threat intelligence concepts against a range of threat actors and threat tools (i.e. ra

Esalate 发表于 2025-3-27 14:18:08

http://reply.papertrans.cn/25/2418/241784/241784_35.png

blithe 发表于 2025-3-27 21:50:35

http://reply.papertrans.cn/25/2418/241784/241784_36.png

贿赂 发表于 2025-3-28 01:04:19

Application of Machine Learning Techniques to Detecting Anomalies in Communication Networks: Datase threats has received considerable attention in research literature. Anomalies of Border Gateway Protocol (BGP) affect network operations and their detection is of interest to researchers and practitioners. In this Chapter, we describe main properties of the protocol and datasets that contain BGP re

不能平静 发表于 2025-3-28 02:44:19

http://reply.papertrans.cn/25/2418/241784/241784_38.png

小步舞 发表于 2025-3-28 06:38:52

Leveraging Machine Learning Techniques for Windows Ransomware Network Traffic Detection,for high revenues creating a viable criminal business model. Individuals, private companies or public service providers e.g. healthcare or utilities companies can all become victims of ransomware attacks and consequently suffer severe disruption and financial loss. Although machine learning algorith

黑豹 发表于 2025-3-28 13:24:13

Leveraging Support Vector Machine for Opcode Density Based Detection of Crypto-Ransomware,orating the use of opcode characteristics and Support Vector Machine have been demonstrated to be a successful method for general malware detection. This research focuses on crypto-ransomware and uses static analysis of malicious and benign Portable Executable files to extract 443 opcodes across all
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Cyber Threat Intelligence; Ali Dehghantanha,Mauro Conti,Tooska Dargahi Book 2018 Springer International Publishing AG, part of Springer Na