Nallaperumal, 2018 - Google Patents
CyberSecurity Analytics to Combat Cyber CrimesNallaperumal, 2018
View PDF- Document ID
- 14779316517694358869
- Author
- Nallaperumal K
- Publication year
- Publication venue
- 2018 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)
External Links
Snippet
Traditional Cyber Security operates on the premise of deploying crime prevention technologies at the network perimeter as the dominant methodology with crime event management at the backseat. Contemporary heterogeneous business world demands …
- 230000002265 prevention 0 abstract description 7
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Madhavram et al. | AI-Driven Threat Detection: Leveraging Big Data For Advanced Cybersecurity Compliance | |
| Yaacoub et al. | Digital forensics vs. Anti-digital forensics: Techniques, limitations and recommendations | |
| Thakur et al. | An analysis of information security event managers | |
| Dave et al. | The new frontier of cybersecurity: emerging threats and innovations | |
| Punithavathani et al. | Surveillance of anomaly and misuse in critical networks to counter insider threats using computational intelligence | |
| Marotta et al. | Integrating a proactive technique into a holistic cyber risk management approach | |
| Duncan et al. | An overview of insider attacks in cloud computing | |
| Kaur et al. | Advanced Cyber Threats and Cybersecurity Innovation-Strategic Approaches and Emerging Solutions | |
| Rakha | Ensuring cyber-security in remote workforce: legal implications and international best practices | |
| Perera et al. | The next gen security operation center | |
| Galla et al. | AI-driven threat detection: Leveraging big data for advanced cybersecurity compliance | |
| Shaffi | Comprehensive digital forensics and risk mitigation strategy for modern enterprises | |
| Ananthapadmanabhan et al. | Threat modeling and threat intelligence system for cloud using splunk | |
| Jasiul et al. | Identification of malware activities with rules | |
| Spanca et al. | Unveiling the Consequences of Data Breaches: Risks, Impacts, and Mitigation in the Digital Age | |
| Caesarano et al. | Network forensics for detecting SQL injection attacks using NIST method | |
| CN113037713B (en) | Network attack resisting method, device, equipment and storage medium | |
| Nallaperumal | CyberSecurity Analytics to Combat Cyber Crimes | |
| US12505209B2 (en) | Cybersecurity workflow management using autodetection | |
| Alsmadi | Cyber threat analysis | |
| Harsch et al. | Assuming a state of compromise: A best practise approach for SMEs on incident response management | |
| Aljurayban et al. | Framework for cloud intrusion detection system service | |
| Yıldız et al. | Cyber-physical systems and cyber security: a bibliometric analysis | |
| Jouini et al. | Threats classification: state of the art | |
| Sample et al. | Zta: Never trust, always verify |