From Database to Cyber Security最新文献

筛选
英文 中文
Some Ideas on Privacy-Aware Data Analytics in the Internet-of-Everything 关于万物互联中隐私感知数据分析的一些想法
From Database to Cyber Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-04834-1_6
S. Cimato, E. Damiani
{"title":"Some Ideas on Privacy-Aware Data Analytics in the Internet-of-Everything","authors":"S. Cimato, E. Damiani","doi":"10.1007/978-3-030-04834-1_6","DOIUrl":"https://doi.org/10.1007/978-3-030-04834-1_6","url":null,"abstract":"","PeriodicalId":340669,"journal":{"name":"From Database to Cyber Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121321820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Strategy for Effective Alert Analysis at a Cyber Security Operations Center 网络安全运营中心的有效警报分析策略
From Database to Cyber Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-04834-1_11
R. Ganesan, Ankit Shah
{"title":"A Strategy for Effective Alert Analysis at a Cyber Security Operations Center","authors":"R. Ganesan, Ankit Shah","doi":"10.1007/978-3-030-04834-1_11","DOIUrl":"https://doi.org/10.1007/978-3-030-04834-1_11","url":null,"abstract":"","PeriodicalId":340669,"journal":{"name":"From Database to Cyber Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128767300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Network Security Metrics: From Known Vulnerabilities to Zero Day Attacks 网络安全指标:从已知漏洞到零日攻击
From Database to Cyber Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-04834-1_22
Lingyu Wang, Mengyuan Zhang, A. Singhal
{"title":"Network Security Metrics: From Known Vulnerabilities to Zero Day Attacks","authors":"Lingyu Wang, Mengyuan Zhang, A. Singhal","doi":"10.1007/978-3-030-04834-1_22","DOIUrl":"https://doi.org/10.1007/978-3-030-04834-1_22","url":null,"abstract":"","PeriodicalId":340669,"journal":{"name":"From Database to Cyber Security","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131891531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Retrieval of Relevant Historical Data Triage Operations in Security Operation Centers 安全运营中心相关历史数据的检索
From Database to Cyber Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-04834-1_12
Tao Lin, Chen Zhong, J. Yen, Peng Liu
{"title":"Retrieval of Relevant Historical Data Triage Operations in Security Operation Centers","authors":"Tao Lin, Chen Zhong, J. Yen, Peng Liu","doi":"10.1007/978-3-030-04834-1_12","DOIUrl":"https://doi.org/10.1007/978-3-030-04834-1_12","url":null,"abstract":"","PeriodicalId":340669,"journal":{"name":"From Database to Cyber Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125538844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Static Analysis for Security Vetting of Android Apps Android应用安全审查的静态分析
From Database to Cyber Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-04834-1_19
Sankardas Roy, Dewan Chaulagain, Shiva Bhusal
{"title":"Static Analysis for Security Vetting of Android Apps","authors":"Sankardas Roy, Dewan Chaulagain, Shiva Bhusal","doi":"10.1007/978-3-030-04834-1_19","DOIUrl":"https://doi.org/10.1007/978-3-030-04834-1_19","url":null,"abstract":"","PeriodicalId":340669,"journal":{"name":"From Database to Cyber Security","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126852294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Attribute-Based Encryption: Applications and Future Directions 基于属性的加密:应用和未来方向
From Database to Cyber Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-04834-1_18
Bruhadeshwar Bezawada, I. Ray
{"title":"Attribute-Based Encryption: Applications and Future Directions","authors":"Bruhadeshwar Bezawada, I. Ray","doi":"10.1007/978-3-030-04834-1_18","DOIUrl":"https://doi.org/10.1007/978-3-030-04834-1_18","url":null,"abstract":"","PeriodicalId":340669,"journal":{"name":"From Database to Cyber Security","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127079797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Function-Based Access Control (FBAC): Towards Preventing Insider Threats in Organizations 基于功能的访问控制(FBAC):防止组织内部威胁
From Database to Cyber Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-04834-1_8
Y. Desmedt, Arash Shaghaghi
{"title":"Function-Based Access Control (FBAC): Towards Preventing Insider Threats in Organizations","authors":"Y. Desmedt, Arash Shaghaghi","doi":"10.1007/978-3-030-04834-1_8","DOIUrl":"https://doi.org/10.1007/978-3-030-04834-1_8","url":null,"abstract":"","PeriodicalId":340669,"journal":{"name":"From Database to Cyber Security","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116010610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Bot or Human? A Behavior-Based Online Bot Detection System 机器人还是人类?基于行为的在线机器人检测系统
From Database to Cyber Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-04834-1_21
Zi Chu, Steven Gianvecchio, Haining Wang
{"title":"Bot or Human? A Behavior-Based Online Bot Detection System","authors":"Zi Chu, Steven Gianvecchio, Haining Wang","doi":"10.1007/978-3-030-04834-1_21","DOIUrl":"https://doi.org/10.1007/978-3-030-04834-1_21","url":null,"abstract":"","PeriodicalId":340669,"journal":{"name":"From Database to Cyber Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116529317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
From Cyber Situational Awareness to Adaptive Cyber Defense: Leveling the Cyber Playing Field 从网络态势感知到适应性网络防御:平衡网络竞争环境
From Database to Cyber Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-04834-1_1
Massimiliano Albanese
{"title":"From Cyber Situational Awareness to Adaptive Cyber Defense: Leveling the Cyber Playing Field","authors":"Massimiliano Albanese","doi":"10.1007/978-3-030-04834-1_1","DOIUrl":"https://doi.org/10.1007/978-3-030-04834-1_1","url":null,"abstract":"","PeriodicalId":340669,"journal":{"name":"From Database to Cyber Security","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127667360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Asymptotic Behavior of Attack Graph Games 攻击图博弈的渐近行为
From Database to Cyber Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-04834-1_5
G. Cybenko, G. Stocco
{"title":"Asymptotic Behavior of Attack Graph Games","authors":"G. Cybenko, G. Stocco","doi":"10.1007/978-3-030-04834-1_5","DOIUrl":"https://doi.org/10.1007/978-3-030-04834-1_5","url":null,"abstract":"","PeriodicalId":340669,"journal":{"name":"From Database to Cyber Security","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134096889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信