Managing Cyber Threats Issues, Approaches, and Challenges /
Modern society depends critically on computers that control and manage systems on which we depend in many aspects of our daily lives. While this provides conveniences of a level unimaginable just a few years ago, it also leaves us vulnerable to attacks on the computers managing these systems. In rec...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
New York, NY :
Springer US : Imprint: Springer,
2005.
|
Edición: | 1st ed. 2005. |
Colección: | Massive Computing,
5 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Overview
- Managing Threats to Web Databases and Cyber Systems
- Intrusion Detection: A Survey
- Data Mining Based Analysis of Computer Attacks
- Learning Rules and Clusters for Anomaly Detection in Network Traffic
- Statistical Causality Analysis of Infosec Alert Data
- Understanding Network Security Data: Using Aggregation, Anomaly Detection, and Cluster Analysis for Summarization
- Techniques for Managing Cyber Vulnerabilities and Alerts
- Early Detection of Active Internet Worms
- Sensor Families for Intrusion Detection Infrastructures
- Encapsulation of User's Intent: A New Proactive Intrusion Assessment Paradigm
- Topological Analysis of Network Attack Vulnerability
- Analyzing Survivable Computation in Critical Infrastructures
- Alert Management Systems: A Quick Introduction
- Cyber Forensics
- Cyber Forensics: Managing, Modeling, and Mining Data for Investigation
- Cyber Forensics: Issues and Approaches.