Alsmadi, 2023 - Google Patents
Data AnalysisAlsmadi, 2023
- Document ID
- 15702794349945479930
- Author
- Alsmadi I
- Publication year
- Publication venue
- The NICE Cyber Security Framework: Cyber Security Intelligence and Analytics
External Links
Snippet
Data Analysis | SpringerLink Skip to main content Advertisement Springer Nature Link Account
Menu Find a journal Publish with us Track your research Search Cart 1.Home 2.The NICE
Cyber Security Framework 3.Chapter Data Analysis Chapter First Online: 14 April 2023 pp …
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Joshi et al. | An integrated knowledge graph to automate cloud data compliance | |
US11050773B2 (en) | Selecting security incidents for advanced automatic analysis | |
Nguyen Duc et al. | Identifying security risks of digital transformation-an engineering perspective | |
Korać et al. | A model of digital identity for better information security in e-learning systems | |
Rains | Cybersecurity Threats, Malware Trends, and Strategies: Discover risk mitigation strategies for modern threats to your organization | |
Chung et al. | Implementing data exfiltration defense in situ: a survey of countermeasures and human involvement | |
Pawlicka et al. | First broad and systematic horizon scanning campaign and study to detect societal and ethical dilemmas and emerging issues spanning over cybersecurity solutions | |
Campfield | The problem with (most) network detection and response | |
Vazão et al. | Implementing and evaluating a GDPR-compliant open-source SIEM solution | |
Chaithanya et al. | Detecting ransomware attacks distribution through phishing URLs Using Machine Learning | |
Senapati et al. | Impact of information leakage and conserving digital privacy | |
Catescu | Detecting insider threats using security information and event management (SIEM) | |
Haber et al. | Privileged Access Management (PAM) | |
Amah et al. | Cybersecurity assessment and vulnerability modelling of networks and web services in Nigerian colleges of education | |
Alsmadi | Data Analysis | |
Tanjin et al. | Privacy and security factors of government websites versus private websites in Bangladesh and USA: a comparative study | |
Copeland et al. | Azure Security Center and Azure Sentinel | |
Copeland | Introduction to the MITRE Matrix | |
Munir et al. | Handbook of research on security considerations in Cloud Computing | |
Mukhopadhyay et al. | Banking Transaction Considerations on Standardized Browser Architecture | |
Copeland | Cybersecurity: How Security Vulnerabilities Affect Your Business: Thought Leadership | |
Torres et al. | Data-Driven Cyber Threat Intelligence: A Survey of Mexican Territory | |
Wu et al. | Big data security framework based on encryption | |
Alsmadi | Cyber Policy and Strategy Management | |
Sharma | Eliminating Misconfiguration and Privilege Escalation in Docker Images |