Big data analytics and intelligent systems for cyber threat intelligence. (2023)
- Record Type:
- Book
- Title:
- Big data analytics and intelligent systems for cyber threat intelligence. (2023)
- Main Title:
- Big data analytics and intelligent systems for cyber threat intelligence
- Further Information:
- Note: Edited by Yassine Maleh, Mamoun Alazab, Loai Tawalbeh, Imed Romdhani.
- Editors:
- Maleh, Yassine, 1987-
Alazab, Mamoun, 1980-
Tawalbeh, Loai
Romdhani, Imed - Contents:
- 1 Cyber Threat Intelligence Model: An Evaluation of Taxonomies and Sharing Platforms; Hassan Jalil Hadi, Muhammad Adeen Riaz, Zaheer Abbas, et al. 2 Evaluation of Open-sourceWeb Application Firewalls for Cyber Threat Intelligence; Oumaima Chakir, Yassine Sadqi, and Yassine Maleh 3 Comprehensive Survey of Location Privacy and Proposed Effective Approach to Protecting the Privacy of LBS Users; Ahmed Aloui, Samir Bourekkache, Okba Kazar, et al. 4 Analysis of Encrypted Network Traffic using Machine Learning Models; Aradhita Bhandari, Aswani Kumar Cherukuri, and Sumaiya Thaseen Ikram 5 Comparative Analysis of Android Application Dissection and Analysis Tools for Identifying Malware Attributes; Swapna Augustine Nikale and Seema Purohit 6 Classifying Android PendingIntent Security using Machine Learning Algorithms; Pradeep Kumar D. S. and Geetha S. 7 Machine Learning and Blockchain Integration for Security Applications; Aradhita Bhandari, Aswani Kumar Cherukuri, and Firuz Kamalov 8 Cyberthreat Real-time Detection Based on an Intelligent Hybrid Network Intrusion Detection System; Said Ouiazzane, Malika Addou, and Fatimazahra Barramou 9 Intelligent Malware Detection and Classification using Boosted Tree Learning Paradigm; S. Abijah Roseline and S. Geetha 10 Malware and Ransomware Classification, Detection, and Prevention using Artificial Intelligence (AI) Techniques; Md Jobair Hossain Faruk, Hossain Shahriar, Mohammad Masum, et al. 11 Detecting High-quality GAN-generated Face Images1 Cyber Threat Intelligence Model: An Evaluation of Taxonomies and Sharing Platforms; Hassan Jalil Hadi, Muhammad Adeen Riaz, Zaheer Abbas, et al. 2 Evaluation of Open-sourceWeb Application Firewalls for Cyber Threat Intelligence; Oumaima Chakir, Yassine Sadqi, and Yassine Maleh 3 Comprehensive Survey of Location Privacy and Proposed Effective Approach to Protecting the Privacy of LBS Users; Ahmed Aloui, Samir Bourekkache, Okba Kazar, et al. 4 Analysis of Encrypted Network Traffic using Machine Learning Models; Aradhita Bhandari, Aswani Kumar Cherukuri, and Sumaiya Thaseen Ikram 5 Comparative Analysis of Android Application Dissection and Analysis Tools for Identifying Malware Attributes; Swapna Augustine Nikale and Seema Purohit 6 Classifying Android PendingIntent Security using Machine Learning Algorithms; Pradeep Kumar D. S. and Geetha S. 7 Machine Learning and Blockchain Integration for Security Applications; Aradhita Bhandari, Aswani Kumar Cherukuri, and Firuz Kamalov 8 Cyberthreat Real-time Detection Based on an Intelligent Hybrid Network Intrusion Detection System; Said Ouiazzane, Malika Addou, and Fatimazahra Barramou 9 Intelligent Malware Detection and Classification using Boosted Tree Learning Paradigm; S. Abijah Roseline and S. Geetha 10 Malware and Ransomware Classification, Detection, and Prevention using Artificial Intelligence (AI) Techniques; Md Jobair Hossain Faruk, Hossain Shahriar, Mohammad Masum, et al. 11 Detecting High-quality GAN-generated Face Images using Neural Networks; Ehsan Nowroozi and Yassine Mekdad 12 Fault Tolerance of Network Routers using Machine Learning Techniques; Harinahalli Lokesh Gururaj, Francesco Flammini, Beekanahalli Harish Swathi, et al. … (more)
- Edition:
- 1st
- Publisher Details:
- Gistrup : River Publishers
- Publication Date:
- 2023
- Extent:
- 1 online resource (280 pages), illustrations (black and white, and colour)
- Subjects:
- 005.87
Cyber intelligence (Computer security)
Big data
Artificial intelligence - Languages:
- English
- ISBNs:
- 9781000846713
9781000846690 - Related ISBNs:
- 9788770227780
- Notes:
- Note: Description based on CIP data; resource not viewed.
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.763356
- Ingest File:
- 18_056.xml