[go: up one dir, main page]

Nallaperumal, 2018 - Google Patents

CyberSecurity Analytics to Combat Cyber Crimes

Nallaperumal, 2018

View PDF
Document ID
14779316517694358869
Author
Nallaperumal K
Publication year
Publication venue
2018 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)

External Links

Snippet

Traditional Cyber Security operates on the premise of deploying crime prevention technologies at the network perimeter as the dominant methodology with crime event management at the backseat. Contemporary heterogeneous business world demands …
Continue reading at ieeexplore.ieee.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Similar Documents

Publication Publication Date Title
Madhavram et al. AI-Driven Threat Detection: Leveraging Big Data For Advanced Cybersecurity Compliance
Yaacoub et al. Digital forensics vs. Anti-digital forensics: Techniques, limitations and recommendations
Thakur et al. An analysis of information security event managers
Dave et al. The new frontier of cybersecurity: emerging threats and innovations
Punithavathani et al. Surveillance of anomaly and misuse in critical networks to counter insider threats using computational intelligence
Marotta et al. Integrating a proactive technique into a holistic cyber risk management approach
Duncan et al. An overview of insider attacks in cloud computing
Kaur et al. Advanced Cyber Threats and Cybersecurity Innovation-Strategic Approaches and Emerging Solutions
Rakha Ensuring cyber-security in remote workforce: legal implications and international best practices
Perera et al. The next gen security operation center
Galla et al. AI-driven threat detection: Leveraging big data for advanced cybersecurity compliance
Shaffi Comprehensive digital forensics and risk mitigation strategy for modern enterprises
Ananthapadmanabhan et al. Threat modeling and threat intelligence system for cloud using splunk
Jasiul et al. Identification of malware activities with rules
Spanca et al. Unveiling the Consequences of Data Breaches: Risks, Impacts, and Mitigation in the Digital Age
Caesarano et al. Network forensics for detecting SQL injection attacks using NIST method
CN113037713B (en) Network attack resisting method, device, equipment and storage medium
Nallaperumal CyberSecurity Analytics to Combat Cyber Crimes
US12505209B2 (en) Cybersecurity workflow management using autodetection
Alsmadi Cyber threat analysis
Harsch et al. Assuming a state of compromise: A best practise approach for SMEs on incident response management
Aljurayban et al. Framework for cloud intrusion detection system service
Yıldız et al. Cyber-physical systems and cyber security: a bibliometric analysis
Jouini et al. Threats classification: state of the art
Sample et al. Zta: Never trust, always verify