000 03383naaaa2200445uu 4500
001 https://directory.doabooks.org/handle/20.500.12854/95748
005 20230418153056.0
003 oapen
006 m o d
007 cr|mn|---annan
008 20230105s2022 xx |||||o ||| 0|eng d
020 _a9781680838350
020 _a9781680838343
040 _aoapen
_coapen
024 7 _a10.1561/9781680838350
_cdoi
041 0 _aeng
042 _adc
072 7 _aUR
_2bicssc
100 1 _aSargsyan, Gohar
_4edt
700 1 _aKavallieros, Dimitrios
_4edt
700 1 _aKolokotronis, Nicholas
_4edt
700 1 _aSargsyan, Gohar
_4oth
700 1 _aKavallieros, Dimitrios
_4oth
700 1 _aKolokotronis, Nicholas
_4oth
245 1 0 _aSecurity Technologies and Methods for Advanced Cyber Threat Intelligence, Detection and Mitigation
260 _bNow Publishers
_c2022
300 _a1 electronic resource (234 p.)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
490 1 _aNowOpen
506 0 _aOpen Access
_2star
_fUnrestricted online access
520 _aThe rapid growth of the Internet interconnectivity and complexity of communication systems has led us to a significant growth of cyberattacks globally often with severe and disastrous consequences. The swift development of more innovative and effective (cyber)security solutions and approaches are vital which can detect, mitigate and prevent from these serious consequences. Cybersecurity is gaining momentum and is scaling up in very many areas. This book builds on the experience of the Cyber-Trust EU project’s methods, use cases, technology development, testing and validation and extends into a broader science, lead IT industry market and applied research with practical cases. It offers new perspectives on advanced (cyber) security innovation (eco) systems covering key different perspectives. The book provides insights on new security technologies and methods for advanced cyber threat intelligence, detection and mitigation. We cover topics such as cyber-security and AI, cyber-threat intelligence, digital forensics, moving target defense, intrusion detection systems, post-quantum security, privacy and data protection, security visualization, smart contracts security, software security, blockchain, security architectures, system and data integrity, trust management systems, distributed systems security, dynamic risk management, privacy and ethics.
540 _aCreative Commons
_fhttps://creativecommons.org/licenses/by-nc/4.0/
_2cc
_4https://creativecommons.org/licenses/by-nc/4.0/
546 _aEnglish
650 7 _aComputer security
_2bicssc
653 _aCybersecurity, AI, cyber-threat intelligence, digital forensics, moving target defense, intrusion detection systems, post-quantum security, privacy and data protection, security visualization, smart contracts security, software security, security architectures, system and data integrity, trust management systems, distributed systems security and dynamic risk management
856 4 0 _awww.oapen.org
_uhttps://library.oapen.org/bitstream/20.500.12657/60496/1/9781680838350.pdf
_70
_zDOAB: download the publication
856 4 0 _awww.oapen.org
_uhttps://directory.doabooks.org/handle/20.500.12854/95748
_70
_zDOAB: description of the publication
999 _c6527
_d6527
909 _a4
_bDarya Shvetsova
_c4
_dDarya Shvetsova