000 | 03383naaaa2200445uu 4500 | ||
---|---|---|---|
001 | https://directory.doabooks.org/handle/20.500.12854/95748 | ||
005 | 20230418153056.0 | ||
003 | oapen | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20230105s2022 xx |||||o ||| 0|eng d | ||
020 | _a9781680838350 | ||
020 | _a9781680838343 | ||
040 |
_aoapen _coapen |
||
024 | 7 |
_a10.1561/9781680838350 _cdoi |
|
041 | 0 | _aeng | |
042 | _adc | ||
072 | 7 |
_aUR _2bicssc |
|
100 | 1 |
_aSargsyan, Gohar _4edt |
|
700 | 1 |
_aKavallieros, Dimitrios _4edt |
|
700 | 1 |
_aKolokotronis, Nicholas _4edt |
|
700 | 1 |
_aSargsyan, Gohar _4oth |
|
700 | 1 |
_aKavallieros, Dimitrios _4oth |
|
700 | 1 |
_aKolokotronis, Nicholas _4oth |
|
245 | 1 | 0 | _aSecurity Technologies and Methods for Advanced Cyber Threat Intelligence, Detection and Mitigation |
260 |
_bNow Publishers _c2022 |
||
300 | _a1 electronic resource (234 p.) | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
490 | 1 | _aNowOpen | |
506 | 0 |
_aOpen Access _2star _fUnrestricted online access |
|
520 | _aThe rapid growth of the Internet interconnectivity and complexity of communication systems has led us to a significant growth of cyberattacks globally often with severe and disastrous consequences. The swift development of more innovative and effective (cyber)security solutions and approaches are vital which can detect, mitigate and prevent from these serious consequences. Cybersecurity is gaining momentum and is scaling up in very many areas. This book builds on the experience of the Cyber-Trust EU project’s methods, use cases, technology development, testing and validation and extends into a broader science, lead IT industry market and applied research with practical cases. It offers new perspectives on advanced (cyber) security innovation (eco) systems covering key different perspectives. The book provides insights on new security technologies and methods for advanced cyber threat intelligence, detection and mitigation. We cover topics such as cyber-security and AI, cyber-threat intelligence, digital forensics, moving target defense, intrusion detection systems, post-quantum security, privacy and data protection, security visualization, smart contracts security, software security, blockchain, security architectures, system and data integrity, trust management systems, distributed systems security, dynamic risk management, privacy and ethics. | ||
540 |
_aCreative Commons _fhttps://creativecommons.org/licenses/by-nc/4.0/ _2cc _4https://creativecommons.org/licenses/by-nc/4.0/ |
||
546 | _aEnglish | ||
650 | 7 |
_aComputer security _2bicssc |
|
653 | _aCybersecurity, AI, cyber-threat intelligence, digital forensics, moving target defense, intrusion detection systems, post-quantum security, privacy and data protection, security visualization, smart contracts security, software security, security architectures, system and data integrity, trust management systems, distributed systems security and dynamic risk management | ||
856 | 4 | 0 |
_awww.oapen.org _uhttps://library.oapen.org/bitstream/20.500.12657/60496/1/9781680838350.pdf _70 _zDOAB: download the publication |
856 | 4 | 0 |
_awww.oapen.org _uhttps://directory.doabooks.org/handle/20.500.12854/95748 _70 _zDOAB: description of the publication |
999 |
_c6527 _d6527 |
||
909 |
_a4 _bDarya Shvetsova _c4 _dDarya Shvetsova |