Managing Cyber Threats Issues, Approaches, and Challenges /
Modern society depends critically on computers that control and manage systems on which we depend in many aspects of our daily lives. While this provides conveniences of a level unimaginable just a few years ago, it also leaves us vulnerable to attacks on the computers managing these systems. In rec...
| Corporate Author: | |
|---|---|
| Other Authors: | , , |
| Format: | Electronic eBook |
| Language: | English |
| Published: |
Boston, MA :
Springer US,
2005.
|
| Series: | Massive Computing,
5 |
| Subjects: | |
| Online Access: | Full Text via HEAL-Link |
Table of Contents:
- Overview
- Managing Threats to Web Databases and Cyber Systems
- Intrusion Detection: A Survey
- Data Mining Based Analysis of Computer Attacks
- Learning Rules and Clusters for Anomaly Detection in Network Traffic
- Statistical Causality Analysis of Infosec Alert Data
- Understanding Network Security Data: Using Aggregation, Anomaly Detection, and Cluster Analysis for Summarization
- Techniques for Managing Cyber Vulnerabilities and Alerts
- Early Detection of Active Internet Worms
- Sensor Families for Intrusion Detection Infrastructures
- Encapsulation of User’s Intent: A New Proactive Intrusion Assessment Paradigm
- Topological Analysis of Network Attack Vulnerability
- Analyzing Survivable Computation in Critical Infrastructures
- Alert Management Systems: A Quick Introduction
- Cyber Forensics
- Cyber Forensics: Managing, Modeling, and Mining Data for Investigation
- Cyber Forensics: Issues and Approaches.