Cyber Threat Intelligence

This book provides readers with up-to-date research of emerging cyber threats and defensive mechanisms, which are timely and essential. It covers cyber threat intelligence concepts against a range of threat actors and threat tools (i.e. ransomware) in cutting-edge technologies, i.e., Internet of Thi...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Dehghantanha, Ali (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Conti, Mauro (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Dargahi, Tooska (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Cham : Springer International Publishing : Imprint: Springer, 2018.
Έκδοση:1st ed. 2018.
Σειρά:Advances in Information Security, 70
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • 1 Introduction
  • 2 Machine Learning Aided Static Malware Analysis
  • 3 Application of Machine Learning Techniques to Detecting Anomalies in Communication Networks: Datasets and Feature Selection
  • 4 Application of Machine Learning Techniques to Detecting Anomalies in Communication Networks: Classification Algorithms
  • 5 Leveraging Machine Learning Techniques for Windows Ransomware Network Traffic Detection
  • 6 Leveraging Support Vector Machine for Opcode Density Based Detection of Crypto-Ransomware
  • 7 BoTShark - A Deep Learning Approach for Botnet Traffic Detection
  • 8 A Practical Analysis of The Rise in Mobile Phishing
  • 9 PDF-Malware Detection: A Survey and Taxonomy of Current Techniques
  • 10 Adaptive Traffic Fingerprinting for Darknet Threat Intelligence
  • 11 A Model for Android and iOS Applications Risk Calculations: CVSS Analysis and Enhancement Using Case-Control Studies
  • 12 A Honeypot Proxy Framework for Deceiving Attackers with Fabricated Content
  • 13 Investigating the Possibility of Data Leakage in Time of Live VM Migration
  • 14 Forensics Investigation of OpenFlow-Based SDN Platforms
  • 15 Mobile Forensics: A Bibliometric Analysis
  • 16 Emerging from The Cloud: A Bibliometric Analysis of Cloud Forensics Studies.