Nair et al., 2024 - Google Patents
Advanced Cybersecurity Tools and TechniquesNair et al., 2024
- Document ID
- 13385262473192004049
- Author
- Nair R
- Santhosh N
- Dodiya K
- Publication year
- Publication venue
- Advanced Techniques and Applications of Cybersecurity and Forensics
External Links
Snippet
Cybersecurity is becoming crucial for the information technology industry. Cybersecurity trends, new advancements, security risks, and difficulties are discussed. The thorough evaluation research is anticipated to demonstrate IT and cybersecurity. Since all data is now …
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Süzen | A risk-assessment of cyber attacks and defense strategies in industry 4.0 ecosystem | |
| Vukalović et al. | Advanced persistent threats-detection and defense | |
| Agarwal et al. | A closer look at intrusion detection system for web applications | |
| Punithavathani et al. | Surveillance of anomaly and misuse in critical networks to counter insider threats using computational intelligence | |
| Aboelfotoh et al. | A review of cyber-security measuring and assessment methods for modern enterprises | |
| Marinova-Boncheva | A short survey of intrusion detection systems | |
| Hussein et al. | Secure Mechanism Applied to Big Data for IIoT by Using Security Event and Information Management System (SIEM). | |
| Akhtar | Securing operating systems (OS): a comprehensive approach to security with best practices and techniques | |
| Kaushik et al. | Advanced techniques and applications of cybersecurity and forensics | |
| Caesarano et al. | Network forensics for detecting SQL injection attacks using NIST method | |
| Ahmad et al. | Cloud Computing–Threats and Challenges | |
| Gür et al. | Security analysis of computer networks: Key concepts and methodologies | |
| Georgina et al. | Deception based techniques against ransomwares: A systematic review | |
| Bhardwaj et al. | Machine learning and artificial intelligence for detecting cyber security threats in iot environmment | |
| Chinwe et al. | Adversarial tactics, techniques, and procedures (TTPs): A deep dive into modern cyber attacks | |
| Karie et al. | Cybersecurity incident response in the enterprise | |
| Auti et al. | HoneyTrack: An improved honeypot | |
| Bendiab et al. | IoT Security Frameworks and Countermeasures | |
| Panda et al. | Intrusion prevention system | |
| Adiwal et al. | Intrusion detection and prevention in openstack: A case study on enhancing security and threat detection | |
| Ayodele | Impact of Cyber Security on Network Traffic | |
| Zafar et al. | Network security: a survey of modern approaches | |
| Kishore et al. | Intrusion detection system a need | |
| Nair et al. | Advanced Cybersecurity Tools and Techniques | |
| Irwin | Double-edged sword: dual-purpose cyber security methods |