|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Jun Zhao , Weizhi MengPublisher: Springer Nature Switzerland AG Imprint: Springer Nature Switzerland AG Volume: 15441 ISBN: 9789819624164ISBN 10: 9819624169 Pages: 474 Publication Date: 04 March 2025 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Manufactured on demand ![]() We will order this item for you from a manufactured on demand supplier. Table of Contents.- A Novel Scoring Algorithm Against HID Attacks Based on Static Text Feature Matching. .- Identifying Ransomware Functions through Microarchitectural Side-channel Analysis. .- STARMAP: Multi-machine Malware Analysis System for Lateral Movement Observation. .- LogSHIELD: A Graph-based Real-time Anomaly Detection Framework using Frequency Analysis. .- Completeness Analysis of Mobile Apps’ Privacy Policies by Using Deep Learning. .- Characterizing the Evolution of Psychological Tactics and Techniques Exploited by Malicious Emails. .- Matching Knowledge Graphs for Cybersecurity Countermeasures Selection. .- Graph-Based Profiling of Dependency Vulnerability Remediation. .- Characterizing the Evolution of Psychological Factors Exploited by Malicious Emails. .- An Enhanced Firewall for IoT Security. .- Exploring the Effects of Cybersecurity Awareness and Decision-Making Under Risk. .- SVSM-KMS: Safeguarding Keys for Cloud Services with Encrypted Virtualization. .- GNNexPIDS: An Interpretation Method for Provenance-based Intrusion Detection Based on GNNExplainer. .- Performance Evaluation of Lightweight Cryptographic Ciphers on ARM Processor for IoT Deployments. .- AutoCRAT: Automatic Cumulative Reconstruction of Alert Trees. .- FAF-BM: An Approach for False Alerts Filtering using BERT Model with Semi-supervised Active Learning. .- Smart Home Cyber Insurance Pricing. .- Exhaustive Exploratory Analysis of Low Degree Maximum Period NLFSRs By Graph Analysis. .- Integrating Consortium Blockchain and Attribute-Based Searchable Encryption for Automotive Threat Intelligence Sharing Model. .- Multi-Modal Multi-Task Tiered Expert (M3TTE): An Effective Method for CDN Website Classification. .- Malware Variant Detection Based on Knowledge Transfer and Ensemble Learning. .- An Efficient IOC-Driven BigData Tracing and Backtracking Model for Emergency Response. .- Integrating CP-ABE and Device Fingerprint into Federated Learning. .- Automatic Alert Categories Standardization for Heterogeneous Devices with Incomplete Semantic Knowledge Based on LSTM. .- Family Similarity-Enhanced Implicit Data Augmentation for Malware Classification.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |