[go: up one dir, main page]

Nair et al., 2024 - Google Patents

Advanced Cybersecurity Tools and Techniques

Nair et al., 2024

Document ID
13385262473192004049
Author
Nair R
Santhosh N
Dodiya K
Publication year
Publication venue
Advanced Techniques and Applications of Cybersecurity and Forensics

External Links

Snippet

Cybersecurity is becoming crucial for the information technology industry. Cybersecurity trends, new advancements, security risks, and difficulties are discussed. The thorough evaluation research is anticipated to demonstrate IT and cybersecurity. Since all data is now …
Continue reading at www.taylorfrancis.com (other versions)

Similar Documents

Publication Publication Date Title
Süzen A risk-assessment of cyber attacks and defense strategies in industry 4.0 ecosystem
Vukalović et al. Advanced persistent threats-detection and defense
Agarwal et al. A closer look at intrusion detection system for web applications
Punithavathani et al. Surveillance of anomaly and misuse in critical networks to counter insider threats using computational intelligence
Aboelfotoh et al. A review of cyber-security measuring and assessment methods for modern enterprises
Marinova-Boncheva A short survey of intrusion detection systems
Hussein et al. Secure Mechanism Applied to Big Data for IIoT by Using Security Event and Information Management System (SIEM).
Akhtar Securing operating systems (OS): a comprehensive approach to security with best practices and techniques
Kaushik et al. Advanced techniques and applications of cybersecurity and forensics
Caesarano et al. Network forensics for detecting SQL injection attacks using NIST method
Ahmad et al. Cloud Computing–Threats and Challenges
Gür et al. Security analysis of computer networks: Key concepts and methodologies
Georgina et al. Deception based techniques against ransomwares: A systematic review
Bhardwaj et al. Machine learning and artificial intelligence for detecting cyber security threats in iot environmment
Chinwe et al. Adversarial tactics, techniques, and procedures (TTPs): A deep dive into modern cyber attacks
Karie et al. Cybersecurity incident response in the enterprise
Auti et al. HoneyTrack: An improved honeypot
Bendiab et al. IoT Security Frameworks and Countermeasures
Panda et al. Intrusion prevention system
Adiwal et al. Intrusion detection and prevention in openstack: A case study on enhancing security and threat detection
Ayodele Impact of Cyber Security on Network Traffic
Zafar et al. Network security: a survey of modern approaches
Kishore et al. Intrusion detection system a need
Nair et al. Advanced Cybersecurity Tools and Techniques
Irwin Double-edged sword: dual-purpose cyber security methods