This book brings together researchers in the field of big data analytics and intelligent systems for cyber threat intelligence CTI and key data to advance the mission of anticipating, prohibiting, preventing, preparing, and responding to internal security.
This book brings together researchers in the field of big data analytics and intelligent systems for cyber threat intelligence CTI and key data to advance the mission of anticipating, prohibiting, preventing, preparing, and responding to internal security.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
1 Cyber Threat Intelligence Model: An Evaluation of Taxonomies and Sharing Platforms 2 Evaluation of Open-sourceWeb Application Firewalls for Cyber Threat Intelligence 3 Comprehensive Survey of Location Privacy and Proposed Effective Approach to Protecting the Privacy of LBS Users 4 Analysis of Encrypted Network Traffic using Machine Learning Models 5 Comparative Analysis of Android Application Dissection and Analysis Tools for Identifying Malware Attributes 6 Classifying Android PendingIntent Security using Machine Learning Algorithms 7 Machine Learning and Blockchain Integration for Security Applications 8 Cyberthreat Real-time Detection Based on an Intelligent Hybrid Network Intrusion Detection System 9 Intelligent Malware Detection and Classification using Boosted Tree Learning Paradigm 10 Malware and Ransomware Classification, Detection, and Prevention using Artificial Intelligence (AI) Techniques 11 Detecting High-quality GAN-generated Face Images using Neural Networks 12 Fault Tolerance of Network Routers using Machine Learning Techniques
1 Cyber Threat Intelligence Model: An Evaluation of Taxonomies and Sharing Platforms 2 Evaluation of Open-sourceWeb Application Firewalls for Cyber Threat Intelligence 3 Comprehensive Survey of Location Privacy and Proposed Effective Approach to Protecting the Privacy of LBS Users 4 Analysis of Encrypted Network Traffic using Machine Learning Models 5 Comparative Analysis of Android Application Dissection and Analysis Tools for Identifying Malware Attributes 6 Classifying Android PendingIntent Security using Machine Learning Algorithms 7 Machine Learning and Blockchain Integration for Security Applications 8 Cyberthreat Real-time Detection Based on an Intelligent Hybrid Network Intrusion Detection System 9 Intelligent Malware Detection and Classification using Boosted Tree Learning Paradigm 10 Malware and Ransomware Classification, Detection, and Prevention using Artificial Intelligence (AI) Techniques 11 Detecting High-quality GAN-generated Face Images using Neural Networks 12 Fault Tolerance of Network Routers using Machine Learning Techniques
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497