Search "cyber security methods"

Bernik, Igor - Cybercrime and Cyber Warfare, ebook

Cybercrime and Cyber Warfare

Bernik, Igor


The book illustrates differences between the two fields, perpetrators’ activities, as well as the methods of investigating and fighting against attacks committed by perpetrators operating in cyberspace.
The first chapter focuses on the understanding of cybercrime,

Jajodia, Sushil - Cyber Situational Awareness, ebook

Cyber Situational Awareness

Jajodia, Sushil


Overview of Cyber Situation Awareness
George P. Tadda, John S. Salerno
3. RPD-based Hypothesis Reasoning for Cyber Situation Awareness
John Yen, Michael McNeese, Tracy Mullen, David Hall, Xiaocong Fan, Peng Liu

Yu, Philip S. - Machine Learning in Cyber Trust, ebook

Machine Learning in Cyber Trust

Yu, Philip S.


Survey of Machine Learning Methods for Database Security
Ashish Kamra, Elisa Ber
5. Identifying Threats Using Graph-based Anomaly Detection
William Eberle, Lawrence Holder, Diane Cook
6. On the Performance of Online Learning Methods

Jacobs, Jay - Data-Driven Security: Analysis, Visualization and Dashboards, ebook

Data-Driven Security: Analysis, Visualization and Dashboards

Jacobs, Jay


Uncover hidden patterns of data and respond with countermeasures
Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful ? data analysis and visualization.

Daimi, Kevin - Computer and Network Security Essentials, ebook

Computer and Network Security Essentials

Daimi, Kevin


Differentiating Security from Privacy in Internet of Things: A Survey of Selected Threats and Controls
A. Al-Gburi, A. Al-Hasnawi, L. Lilien
10. Reliable Transmission Protocol for Underwater Acoustic Networks
Xiujuan Du, Meiju Li, Keqin Li
11. Using

Schneier, Bruce - Economics of Information Security and Privacy III, ebook

Economics of Information Security and Privacy III

Schneier, Bruce


Fixed Costs, Investment Rigidities, and Risk Aversion in Information Security: A Utility-theoretic Approach
Christos Ioannidis, David Pym, Julian Williams
9. Are Home Internet Users Willing to Pay ISPs for Improvements in Cyber Security?
Brent Rowe, Dallas