Search Results - "Attacker"

  1. 621
  2. 622
  3. 623
  4. 624
  5. 625
  6. 626
  7. 627
  8. 628
  9. 629
  10. 630
  11. 631
  12. 632
  13. 633
  14. 634

    Cybersecurity of Digital Service Chains Challenges, Methodologies, and Tools /

    Published 2022
    Table of Contents: “…A Reference Architecture for Management of Security Operations in Digital Service Chains -- Efficient flow monitoring in digital services -- Intelligent Transportation Systems -- models, challenges, security aspects -- NAD: Machine Learning based Component for Unknown Attack Detection in Network Traffic -- Detecting unknown attacks through system behavior analysis -- Signature-based detection of botnet DDoS attacks -- Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation -- Blockchain-based task and information management in computational cloud systems.…”
    Link to Metadata
    Electronic eBook
  15. 635
  16. 636
  17. 637
  18. 638
  19. 639
  20. 640