Cyber-Security Threats, Actors, and Dynamic Mitigation
portes grátis
Cyber-Security Threats, Actors, and Dynamic Mitigation
Kolokotronis, Nicholas; Shiaeles, Stavros
Taylor & Francis Ltd
10/2024
374
Mole
9780367745875
Pré-lançamento - envio 15 a 20 dias após a sua edição
Descrição não disponível.
1. Cyber-attackers' profiling. 2. Reconnaissance. 3. System threats. 4. Cryptography threats. 5. Network threats. 6. Malware detection and mitigation. 7. Dynamic risk management. 8. Attack graph generation. 9. Intelligent intrusion response.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Attack Graph;IP Address;IOT Systems;Malware Analysis;Critical Information Infrastructures;Malware Samples;Malware Detection;Security Content Automation Protocol;Internet of Things;Obfuscation Techniques;Machine Learning;Cyber Kill Chain;Attack Graphs;Cbc Mode;Risk management;Post Condition Models;Industrial IoT;Block Cipher;Smart homes;Stream Cipher;SQL Injection Attack;Cyber-security threats;POMDP Model;TLS Protocol;Selective Forwarding Attacks;Reconnaissance Agent;MITM Attack;Wormhole Attack;Rest API;Mac Os;ICMP Message;PHP Script;Sinkhole Attack;Flooding Attack
1. Cyber-attackers' profiling. 2. Reconnaissance. 3. System threats. 4. Cryptography threats. 5. Network threats. 6. Malware detection and mitigation. 7. Dynamic risk management. 8. Attack graph generation. 9. Intelligent intrusion response.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Attack Graph;IP Address;IOT Systems;Malware Analysis;Critical Information Infrastructures;Malware Samples;Malware Detection;Security Content Automation Protocol;Internet of Things;Obfuscation Techniques;Machine Learning;Cyber Kill Chain;Attack Graphs;Cbc Mode;Risk management;Post Condition Models;Industrial IoT;Block Cipher;Smart homes;Stream Cipher;SQL Injection Attack;Cyber-security threats;POMDP Model;TLS Protocol;Selective Forwarding Attacks;Reconnaissance Agent;MITM Attack;Wormhole Attack;Rest API;Mac Os;ICMP Message;PHP Script;Sinkhole Attack;Flooding Attack