{"title":"Some Ideas on Privacy-Aware Data Analytics in the Internet-of-Everything","authors":"S. Cimato, E. Damiani","doi":"10.1007/978-3-030-04834-1_6","DOIUrl":"https://doi.org/10.1007/978-3-030-04834-1_6","url":null,"abstract":"","PeriodicalId":340669,"journal":{"name":"From Database to Cyber Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121321820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network Security Metrics: From Known Vulnerabilities to Zero Day Attacks","authors":"Lingyu Wang, Mengyuan Zhang, A. Singhal","doi":"10.1007/978-3-030-04834-1_22","DOIUrl":"https://doi.org/10.1007/978-3-030-04834-1_22","url":null,"abstract":"","PeriodicalId":340669,"journal":{"name":"From Database to Cyber Security","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131891531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Retrieval of Relevant Historical Data Triage Operations in Security Operation Centers","authors":"Tao Lin, Chen Zhong, J. Yen, Peng Liu","doi":"10.1007/978-3-030-04834-1_12","DOIUrl":"https://doi.org/10.1007/978-3-030-04834-1_12","url":null,"abstract":"","PeriodicalId":340669,"journal":{"name":"From Database to Cyber Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125538844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Static Analysis for Security Vetting of Android Apps","authors":"Sankardas Roy, Dewan Chaulagain, Shiva Bhusal","doi":"10.1007/978-3-030-04834-1_19","DOIUrl":"https://doi.org/10.1007/978-3-030-04834-1_19","url":null,"abstract":"","PeriodicalId":340669,"journal":{"name":"From Database to Cyber Security","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126852294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Attribute-Based Encryption: Applications and Future Directions","authors":"Bruhadeshwar Bezawada, I. Ray","doi":"10.1007/978-3-030-04834-1_18","DOIUrl":"https://doi.org/10.1007/978-3-030-04834-1_18","url":null,"abstract":"","PeriodicalId":340669,"journal":{"name":"From Database to Cyber Security","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127079797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Function-Based Access Control (FBAC): Towards Preventing Insider Threats in Organizations","authors":"Y. Desmedt, Arash Shaghaghi","doi":"10.1007/978-3-030-04834-1_8","DOIUrl":"https://doi.org/10.1007/978-3-030-04834-1_8","url":null,"abstract":"","PeriodicalId":340669,"journal":{"name":"From Database to Cyber Security","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116010610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bot or Human? A Behavior-Based Online Bot Detection System","authors":"Zi Chu, Steven Gianvecchio, Haining Wang","doi":"10.1007/978-3-030-04834-1_21","DOIUrl":"https://doi.org/10.1007/978-3-030-04834-1_21","url":null,"abstract":"","PeriodicalId":340669,"journal":{"name":"From Database to Cyber Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116529317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"From Cyber Situational Awareness to Adaptive Cyber Defense: Leveling the Cyber Playing Field","authors":"Massimiliano Albanese","doi":"10.1007/978-3-030-04834-1_1","DOIUrl":"https://doi.org/10.1007/978-3-030-04834-1_1","url":null,"abstract":"","PeriodicalId":340669,"journal":{"name":"From Database to Cyber Security","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127667360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Asymptotic Behavior of Attack Graph Games","authors":"G. Cybenko, G. Stocco","doi":"10.1007/978-3-030-04834-1_5","DOIUrl":"https://doi.org/10.1007/978-3-030-04834-1_5","url":null,"abstract":"","PeriodicalId":340669,"journal":{"name":"From Database to Cyber Security","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134096889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}