Security Technologies and Methods for Advanced Cyber Threat Intelligence, Detection and Mitigation

The rapid growth of the Internet interconnectivity and complexity of communication systems has led us to a significant growth of cyberattacks globally often with severe and disastrous consequences. The swift development of more innovative and effective (cyber)security solutions and approaches are vi...

Full description

Saved in:
Bibliographic Details
Other Authors: Sargsyan, Gohar (Editor), Kavallieros, Dimitrios (Editor), Kolokotronis, Nicholas (Editor)
Format: Electronic Book Chapter
Language:English
Published: Now Publishers 2022
Series:NowOpen
Subjects:
Online Access:DOAB: download the publication
DOAB: description of the publication
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000naaaa2200000uu 4500
001 doab_20_500_12854_95748
005 20230105
003 oapen
006 m o d
007 cr|mn|---annan
008 20230105s2022 xx |||||o ||| 0|eng d
020 |a 9781680838350 
020 |a 9781680838343 
040 |a oapen  |c oapen 
024 7 |a 10.1561/9781680838350  |c doi 
041 0 |a eng 
042 |a dc 
072 7 |a UR  |2 bicssc 
100 1 |a Sargsyan, Gohar  |4 edt 
700 1 |a Kavallieros, Dimitrios  |4 edt 
700 1 |a Kolokotronis, Nicholas  |4 edt 
700 1 |a Sargsyan, Gohar  |4 oth 
700 1 |a Kavallieros, Dimitrios  |4 oth 
700 1 |a Kolokotronis, Nicholas  |4 oth 
245 1 0 |a Security Technologies and Methods for Advanced Cyber Threat Intelligence, Detection and Mitigation 
260 |b Now Publishers  |c 2022 
300 |a 1 electronic resource (234 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a NowOpen 
506 0 |a Open Access  |2 star  |f Unrestricted online access 
520 |a The rapid growth of the Internet interconnectivity and complexity of communication systems has led us to a significant growth of cyberattacks globally often with severe and disastrous consequences. The swift development of more innovative and effective (cyber)security solutions and approaches are vital which can detect, mitigate and prevent from these serious consequences. Cybersecurity is gaining momentum and is scaling up in very many areas. This book builds on the experience of the Cyber-Trust EU project's methods, use cases, technology development, testing and validation and extends into a broader science, lead IT industry market and applied research with practical cases. It offers new perspectives on advanced (cyber) security innovation (eco) systems covering key different perspectives. The book provides insights on new security technologies and methods for advanced cyber threat intelligence, detection and mitigation. We cover topics such as cyber-security and AI, cyber-threat intelligence, digital forensics, moving target defense, intrusion detection systems, post-quantum security, privacy and data protection, security visualization, smart contracts security, software security, blockchain, security architectures, system and data integrity, trust management systems, distributed systems security, dynamic risk management, privacy and ethics. 
540 |a Creative Commons  |f https://creativecommons.org/licenses/by-nc/4.0/  |2 cc  |4 https://creativecommons.org/licenses/by-nc/4.0/ 
546 |a English 
650 7 |a Computer security  |2 bicssc 
653 |a Cybersecurity, AI, cyber-threat intelligence, digital forensics, moving target defense, intrusion detection systems, post-quantum security, privacy and data protection, security visualization, smart contracts security, software security, security architectures, system and data integrity, trust management systems, distributed systems security and dynamic risk management 
856 4 0 |a www.oapen.org  |u https://library.oapen.org/bitstream/20.500.12657/60496/1/9781680838350.pdf  |7 0  |z DOAB: download the publication 
856 4 0 |a www.oapen.org  |u https://directory.doabooks.org/handle/20.500.12854/95748  |7 0  |z DOAB: description of the publication