+

Alguliyev et al., 2023 - Google Patents

CTI Challenges and Perspectives as a Comprehensive Approach to Cyber Resilience

Alguliyev et al., 2023

View PDF
Document ID
7154016624386340954
Author
Alguliyev R
Nabiyev B
Dashdamirova K
Publication year
Publication venue
2023 5th International Conference on Problems of Cybernetics and Informatics (PCI)

External Links

Snippet

The significant growth in the number, variety, and sophistication of cyber threats in recent years makes traditional approaches ineffective against new generation cyber threats. More effective mechanisms against cyber threats and attacks require intelligent analysis of the …
Continue reading at library.ict.az (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Similar Documents

Publication Publication Date Title
Yeboah-Ofori et al. Cyber threat predictive analytics for improving cyber supply chain security
US11075932B2 (en) Appliance extension for remote communication with a cyber security appliance
Madhavram et al. AI-Driven Threat Detection: Leveraging Big Data For Advanced Cybersecurity Compliance
Nagar et al. Novel approach of intrusion detection classification deeplearning using SVM
Shaffi Comprehensive digital forensics and risk mitigation strategy for modern enterprises
Xie et al. Network security defence system based on artificial intelligence and big data technology
Galla et al. AI-driven threat detection: Leveraging big data for advanced cybersecurity compliance
Rawal et al. Cybersecurity and identity access management
Sendjaja et al. Cybersecurity in the digital age: Developing robust strategies to protect against evolving global digital threats and cyber attacks
Seker Cyber threat intelligence understanding fundamentals
Al-Sanjary et al. Challenges on digital cyber-security and network forensics: a survey
Alguliyev et al. CTI Challenges and Perspectives as a Comprehensive Approach to Cyber Resilience
Muhammad et al. Botnet Detection and Incident Response in Security Operation Center (SOC): A Proposed Framework.
Bhardwaj et al. Machine Learning and Artificial Intelligence for Detecting Cyber Security Threats in IoT Environmment
Yudhianto Simple, fast, and accurate cybercrime detection on e-government with elastic stack SIEM
Prabu et al. An automated intrusion detection and prevention model for enhanced network security and threat assessment
Kant How Cyber Threat Intelligence (CTI) Ensures Cyber Resilience Using Artificial Intelligence and Machine Learning
Howes et al. Enabling trustworthy spaces via orchestrated analytical security
Sharko et al. Artificial Intelligence In Cybersecurity Applications
Song et al. Insider threat defense strategies: Survey and knowledge integration
De Vries et al. Towards a roadmap for development of intelligent data analysis based cyber attack detection systems
Brahma et al. An ontology of cyber security automation
Mir et al. An Enhanced Implementation of Security Management System (SSMS) using UEBA in Smart Grid based SCADA Systems
Oye et al. Automated Phishing Detection Using Natural Language Processing (NLP)
Ahmed Data-driven framework and experimental validation for security monitoring of networked systems
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载