Managing Cyber Threats Issues, Approaches, and Challenges /
Modern society depends critically on computers that control and manage systems on which we depend in many aspects of our daily lives. While this provides conveniences of a level unimaginable just a few years ago, it also leaves us vulnerable to attacks on the computers managing these systems. In rec...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Boston, MA :
Springer US,
2005.
|
Σειρά: | Massive Computing,
5 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Overview
- Managing Threats to Web Databases and Cyber Systems
- Intrusion Detection: A Survey
- Data Mining Based Analysis of Computer Attacks
- Learning Rules and Clusters for Anomaly Detection in Network Traffic
- Statistical Causality Analysis of Infosec Alert Data
- Understanding Network Security Data: Using Aggregation, Anomaly Detection, and Cluster Analysis for Summarization
- Techniques for Managing Cyber Vulnerabilities and Alerts
- Early Detection of Active Internet Worms
- Sensor Families for Intrusion Detection Infrastructures
- Encapsulation of User’s Intent: A New Proactive Intrusion Assessment Paradigm
- Topological Analysis of Network Attack Vulnerability
- Analyzing Survivable Computation in Critical Infrastructures
- Alert Management Systems: A Quick Introduction
- Cyber Forensics
- Cyber Forensics: Managing, Modeling, and Mining Data for Investigation
- Cyber Forensics: Issues and Approaches.