找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Cyber Threat Intelligence; Ali Dehghantanha,Mauro Conti,Tooska Dargahi Book 2018 Springer International Publishing AG, part of Springer Na

[复制链接]
楼主: Holter-monitor
发表于 2025-3-26 23:45:28 | 显示全部楼层
Mobile Forensics: A Bibliometric Analysis,dvances investigators have made over time on the subject, the possible future technologies that could influence more changes in the field of mobile forensics and its impact, covering also the difference between mobile forensics and computer forensics.
发表于 2025-3-27 03:35:55 | 显示全部楼层
Emerging from the Cloud: A Bibliometric Analysis of Cloud Forensics Studies,ssment of cloud forensics research trends between 2009 and 2016. Moreover, we provide a classification of cloud forensics process to detect the most profound research areas and highlight remaining challenges.
发表于 2025-3-27 06:14:16 | 显示全部楼层
Book 2018er threat intelligence concepts against a range of threat actors and threat tools (i.e. ransomware) in cutting-edge technologies, i.e., Internet of Things (IoT), Cloud computing and mobile devices. This book also provides the technical information on cyber-threat detection methods required for the r
发表于 2025-3-27 10:46:19 | 显示全部楼层
1568-2633 ne of the first books that focuses on cyber threat intellige.This book provides readers with up-to-date research of emerging cyber threats and defensive mechanisms, which are timely and essential. It covers cyber threat intelligence concepts against a range of threat actors and threat tools (i.e. ra
发表于 2025-3-27 14:18:08 | 显示全部楼层
发表于 2025-3-27 21:50:35 | 显示全部楼层
发表于 2025-3-28 01:04:19 | 显示全部楼层
Application of Machine Learning Techniques to Detecting Anomalies in Communication Networks: Datase threats has received considerable attention in research literature. Anomalies of Border Gateway Protocol (BGP) affect network operations and their detection is of interest to researchers and practitioners. In this Chapter, we describe main properties of the protocol and datasets that contain BGP re
发表于 2025-3-28 02:44:19 | 显示全部楼层
发表于 2025-3-28 06:38:52 | 显示全部楼层
Leveraging Machine Learning Techniques for Windows Ransomware Network Traffic Detection,for high revenues creating a viable criminal business model. Individuals, private companies or public service providers e.g. healthcare or utilities companies can all become victims of ransomware attacks and consequently suffer severe disruption and financial loss. Although machine learning algorith
发表于 2025-3-28 13:24:13 | 显示全部楼层
Leveraging Support Vector Machine for Opcode Density Based Detection of Crypto-Ransomware,orating the use of opcode characteristics and Support Vector Machine have been demonstrated to be a successful method for general malware detection. This research focuses on crypto-ransomware and uses static analysis of malicious and benign Portable Executable files to extract 443 opcodes across all
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-3 12:06
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表