Security Incidents & Response Against Cyber Attacks最新文献

筛选
英文 中文
Exploring and Analysing Surface, Deep, Dark Web and Attacks 探索和分析表面,深层,暗网和攻击
Security Incidents & Response Against Cyber Attacks Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-69174-5_5
Jabeen Sultana, Abdul Khader Jilani
{"title":"Exploring and Analysing Surface, Deep, Dark Web and Attacks","authors":"Jabeen Sultana, Abdul Khader Jilani","doi":"10.1007/978-3-030-69174-5_5","DOIUrl":"https://doi.org/10.1007/978-3-030-69174-5_5","url":null,"abstract":"","PeriodicalId":425310,"journal":{"name":"Security Incidents & Response Against Cyber Attacks","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130236463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cybersecurity Incident Response Against Advanced Persistent Threats (APTs) 针对高级持续性威胁(apt)的网络安全事件响应
Security Incidents & Response Against Cyber Attacks Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-69174-5_9
Akashdeep Bhardwaj
{"title":"Cybersecurity Incident Response Against Advanced Persistent Threats (APTs)","authors":"Akashdeep Bhardwaj","doi":"10.1007/978-3-030-69174-5_9","DOIUrl":"https://doi.org/10.1007/978-3-030-69174-5_9","url":null,"abstract":"","PeriodicalId":425310,"journal":{"name":"Security Incidents & Response Against Cyber Attacks","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131615785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Correction to: Security Incidents & Response Against Cyber Attacks 更正:安全事件和应对网络攻击
Security Incidents & Response Against Cyber Attacks Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-69174-5_12
Akashdeep Bhardwaj, Varun Sapra
{"title":"Correction to: Security Incidents & Response Against Cyber Attacks","authors":"Akashdeep Bhardwaj, Varun Sapra","doi":"10.1007/978-3-030-69174-5_12","DOIUrl":"https://doi.org/10.1007/978-3-030-69174-5_12","url":null,"abstract":"","PeriodicalId":425310,"journal":{"name":"Security Incidents & Response Against Cyber Attacks","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133557527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing ERP Cyber Systems by Preventing Holistic Industrial Intrusion 通过防止整体工业入侵来保护ERP网络系统
Security Incidents & Response Against Cyber Attacks Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-69174-5_6
Sunil Kaushik
{"title":"Securing ERP Cyber Systems by Preventing Holistic Industrial Intrusion","authors":"Sunil Kaushik","doi":"10.1007/978-3-030-69174-5_6","DOIUrl":"https://doi.org/10.1007/978-3-030-69174-5_6","url":null,"abstract":"","PeriodicalId":425310,"journal":{"name":"Security Incidents & Response Against Cyber Attacks","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114214581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Classifying Cyberattacks Amid Covid-19 Using Support Vector Machine 基于支持向量机的Covid-19网络攻击分类
Security Incidents & Response Against Cyber Attacks Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-69174-5_8
Jabeen Sultana, Abdul Khader Jilani
{"title":"Classifying Cyberattacks Amid Covid-19 Using Support Vector Machine","authors":"Jabeen Sultana, Abdul Khader Jilani","doi":"10.1007/978-3-030-69174-5_8","DOIUrl":"https://doi.org/10.1007/978-3-030-69174-5_8","url":null,"abstract":"","PeriodicalId":425310,"journal":{"name":"Security Incidents & Response Against Cyber Attacks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133518155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Collaborative Approaches for Security of Cloud and Knowledge Management Systems: Benefits and Risks 云计算和知识管理系统安全的协作方法:利益与风险
Security Incidents & Response Against Cyber Attacks Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-69174-5_3
N. Jayashri, K. Kalaiselvi
{"title":"Collaborative Approaches for Security of Cloud and Knowledge Management Systems: Benefits and Risks","authors":"N. Jayashri, K. Kalaiselvi","doi":"10.1007/978-3-030-69174-5_3","DOIUrl":"https://doi.org/10.1007/978-3-030-69174-5_3","url":null,"abstract":"","PeriodicalId":425310,"journal":{"name":"Security Incidents & Response Against Cyber Attacks","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122669964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Introduction to Security Incidents and Response Against Cyber Attacks 安全事件简介及应对网络攻击
Security Incidents & Response Against Cyber Attacks Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-69174-5_13
Sam Goundar
{"title":"Introduction to Security Incidents and Response Against Cyber Attacks","authors":"Sam Goundar","doi":"10.1007/978-3-030-69174-5_13","DOIUrl":"https://doi.org/10.1007/978-3-030-69174-5_13","url":null,"abstract":"","PeriodicalId":425310,"journal":{"name":"Security Incidents & Response Against Cyber Attacks","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116393458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Authentication Attacks 身份验证攻击
Security Incidents & Response Against Cyber Attacks Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-69174-5_11
Ankit Vishnoi
{"title":"Authentication Attacks","authors":"Ankit Vishnoi","doi":"10.1007/978-3-030-69174-5_11","DOIUrl":"https://doi.org/10.1007/978-3-030-69174-5_11","url":null,"abstract":"","PeriodicalId":425310,"journal":{"name":"Security Incidents & Response Against Cyber Attacks","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121381901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
By Failing to Prepare, You Are Preparing to Fail 不做好准备,就是在为失败做准备
Security Incidents & Response Against Cyber Attacks Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-69174-5_1
Dinesh O. Bareja
{"title":"By Failing to Prepare, You Are Preparing to Fail","authors":"Dinesh O. Bareja","doi":"10.1007/978-3-030-69174-5_1","DOIUrl":"https://doi.org/10.1007/978-3-030-69174-5_1","url":null,"abstract":"","PeriodicalId":425310,"journal":{"name":"Security Incidents & Response Against Cyber Attacks","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130334703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Exploring Potential of Transfer Deep Learning for Malicious Android Applications Detection 探索迁移深度学习在恶意Android应用检测中的潜力
Security Incidents & Response Against Cyber Attacks Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-69174-5_4
Mohammed Alshehri
{"title":"Exploring Potential of Transfer Deep Learning for Malicious Android Applications Detection","authors":"Mohammed Alshehri","doi":"10.1007/978-3-030-69174-5_4","DOIUrl":"https://doi.org/10.1007/978-3-030-69174-5_4","url":null,"abstract":"","PeriodicalId":425310,"journal":{"name":"Security Incidents & Response Against Cyber Attacks","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114174059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信