THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Tiêu đề | Machine Intelligence and Big Data Analytics for Cybersecurity Applications |
---|---|
Tác giả | Yassine Maleh, Mohammad Shojafar, Mamoun Alazab, Youssef Baddi |
Người hướng dẫn | Janusz Kacprzyk, Series Editor |
Trường học | Sultan Moulay Slimane University |
Chuyên ngành | Cybersecurity Applications |
Thể loại | edited volume |
Năm xuất bản | 2021 |
Thành phố | Beni Mellal |
Định dạng | |
---|---|
Số trang | 533 |
Dung lượng | 18,41 MB |
Nội dung
Ngày đăng: 14/03/2022, 15:11
Nguồn tham khảo
Tài liệu tham khảo | Loại | Chi tiết |
---|---|---|
1. IEEE, Syntegrity (2017) Artificial intelligence and machine learning applied to cybersecurity, presented in Washington DC, USA, 6th–8th October 2017, [Online]. Available at https://www.ieee.org/content/dam/ieeeorg/ieee/web/org/about/industry/ieee_confluence_report.pdf?utm_source=lp-linktext&utm_medium=industry&utm_campaign=confluence-paper. Accessed 20 Mar 2018 | Link | |
3. Shackleford D (2016) SANS 2016 Security Analytics Survey, SANS Institute. [Online].Available at https://www.sans.org/reading-room/whitepapers/analyst/2016-securityanalytics-survey-37467. Accessed 3 Mar 2018 | Link | |
15. Symantec Corporation (2017) The Internet Security Threat Report (ISTR) 2017. [Online].Available at https://www.symantec.com/content/dam/symantec/docs/reports/istr-22-2017-en.pdf. Accessed 13 Mar 2018 | Link | |
2. Pappaterra MJ, Flammini F (2019) A review of intelligent cybersecurity with Bayesian Networks. In: 2019 IEEE international conference on systems, man and cybernetics (SMC), Bari, Italy, pp 445–452 | Khác | |
4. Flammini F, Gaglione A, Otello F, Pappalardo A, Pragliola C, Tedesco A (2010) Towards wireless sensor networks for railway infrastructure monitoring. Ansaldo STS Italy, Università di Napoli Federico II | Khác | |
5. Flammini F, Gaglione A, Mazzocca N, Pragliola C (2008) DETECT: a novel framework for the detection of attacks to critical infrastructures. In: Proceedings of ESREL’08, safety, reliability and risk analysis: theory, methods and applications. CRC Press, Taylor & Francis Group, London, pp 105–112 | Khác | |
6. Gaglione A (2009, November) Threat analysis and detection in critical infrastructure security, Università di Napoli Federico II, Comunità Europea Fondo Sociale Europeo | Khác | |
7. Flammini F, Gaglione A, Mazzocca N, Moscato V, Pragliola C (2009) Online Integration and reasoning for multi-sensor data to enhance infrastructure surveillance. J Inf Assur Secur 4:183–191 | Khác | |
12. Gribaudo M, Iacono M, Marrone S (2015) Exploiting Bayesian Networks for the analysis of combined attack trees. In: Electronic notes in theoretical computer science, vol 310. Elsevier B.V., pp 91–11 | Khác | |
13. Mauw S, Oostdijk M (2005) Foundations of attack trees. In: International conference on information security and cryptology ICISC 2005. LNCS 3935. Springer, pp 186–198 14. Charniak E (1991) Bayesian networks without tears: making Bayesian networks moreaccessible to the probabilistically unsophisticated. AI Mag 12(4):50–63 | Khác | |
16. Buczak A, Guven E (2016) A survey of data mining and machine learning methods for cybersecurity intrusion detection. IEEE Commun Surv Tutorials 18(2) | Khác |
TÀI LIỆU CÙNG NGƯỜI DÙNG
TÀI LIỆU LIÊN QUAN