Narrow your search
Listing 1 - 2 of 2
Sort by

Book
Security Technologies and Methods for Advanced Cyber Threat Intelligence, Detection and Mitigation
Authors: --- ---
ISBN: 1680838350 1680838342 Year: 2022 Publisher: Now Publishers

Loading...
Export citation

Choose an application

Bookmark

Abstract

The rapid growth of the Internet interconnectivity and complexity of communication systems has led us to a significant growth of cyberattacks globally often with severe and disastrous consequences. The swift development of more innovative and effective (cyber)security solutions and approaches are vital which can detect, mitigate and prevent from these serious consequences. Cybersecurity is gaining momentum and is scaling up in very many areas. This book builds on the experience of the Cyber-Trust EU project’s methods, use cases, technology development, testing and validation and extends into a broader science, lead IT industry market and applied research with practical cases. It offers new perspectives on advanced (cyber) security innovation (eco) systems covering key different perspectives. The book provides insights on new security technologies and methods for advanced cyber threat intelligence, detection and mitigation. We cover topics such as cyber-security and AI, cyber-threat intelligence, digital forensics, moving target defense, intrusion detection systems, post-quantum security, privacy and data protection, security visualization, smart contracts security, software security, blockchain, security architectures, system and data integrity, trust management systems, distributed systems security, dynamic risk management, privacy and ethics.


Book
A review of research on problematic internet use and well-being : with recommendations for the U.S. Air Force
Authors: --- --- --- ---
ISBN: 0833090224 9780833090225 0833088246 9780833088246 Year: 2015 Publisher: Santa Monica, Calif. : Rand Corporation,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Internet addiction --- Military Personnel --- Review --- Behavior, Addictive --- Internet --- Journal Article --- Occupational Groups --- Compulsive Behavior --- Computer Communication Networks --- Publication Formats --- Impulsive Behavior --- Persons --- Computer Systems --- Computing Methodologies --- Named Groups --- Behavior --- Publication Characteristics --- Behavior and Behavior Mechanisms --- Information Science --- Psychiatry and Psychology --- Psychiatric Disorders, Individual --- Psychiatry --- Health & Biological Sciences --- Treatment --- Acceptance Process --- Acceptance Processes --- Behaviors --- Process, Acceptance --- Processes, Acceptance --- Information Sciences --- Science, Information --- Sciences, Information --- High Performance Computing --- Methodologies, Computing --- Computing Methodology --- Computing, High Performance --- Methodology, Computing --- Performance Computing, High --- Person --- Impulsivity --- Behavior, Impulsive --- Behaviors, Impulsive --- Impulsive Behaviors --- Impulsivities --- Organization, Computer Systems --- Computer Architecture --- Computer Systems Development --- Computer Systems Evaluation --- Computer Systems Organization --- Real-Time Systems --- Architecture, Computer --- Architectures, Computer --- Computer Architectures --- Computer System --- Computer Systems Evaluations --- Development, Computer Systems --- Evaluation, Computer Systems --- Evaluations, Computer Systems --- Real Time Systems --- Real-Time System --- System, Computer --- System, Real-Time --- Systems, Computer --- Systems, Real-Time --- Computer Network Management --- Databases, Distributed --- Distributed Systems --- Extranets --- Intranets --- Network Communication Protocols --- Telecommunication Networks --- Communication Network, Computer --- Communication Networks, Computer --- Communication Protocol, Network --- Communication Protocols, Network --- Computer Communication Network --- Database, Distributed --- Distributed Database --- Distributed Databases --- Distributed System --- Extranet --- Intranet --- Management, Computer Network --- Network Communication Protocol --- Network Management, Computer --- Network, Computer Communication --- Network, Telecommunication --- Networks, Computer Communication --- Networks, Telecommunication --- Protocol, Network Communication --- Protocols, Network Communication --- System, Distributed --- Systems, Distributed --- Telecommunication Network --- Behavior, Compulsive --- Behaviors, Compulsive --- Compulsive Behaviors --- Group, Occupational --- Groups, Occupational --- Occupational Group --- World Wide Web --- Internets --- Web, World Wide --- Wide Web, World --- Addictive Behavior --- Addictive Behaviors --- Behaviors, Addictive --- Military --- Air Force Personnel --- Armed Forces Personnel --- Army Personnel --- Coast Guard --- Marines --- Navy Personnel --- Sailors --- Soldiers --- Submariners --- Force Personnel, Air --- Personnel, Air Force --- Personnel, Armed Forces --- Personnel, Army --- Personnel, Military --- Personnel, Navy --- Sailor --- Soldier --- Submariner --- Addiction, Internet --- Addiction to the Internet --- Addictive use of the Internet --- Compulsive Internet use --- Delay Discounting --- Telecommunications --- Education, Distance --- Occupations --- Cyber Space --- Cyberspace --- Military Family --- Compulsive behavior --- Military Deployment --- Deployment, Military --- Employee --- Employees --- Personnel --- Worker --- Workers --- Military Health --- Behavior And Behavior Mechanism --- United States. --- Airmen --- Mental health. --- AF (Air force) --- Air Force (U.S.) --- U.S.A.F. (Air force) --- United States Air Force --- US Air Force --- USAF (Air force) --- Veterans --- Psychology --- Factors, Psychological --- Psychological Factors --- Psychological Side Effects --- Psychologists --- Psychosocial Factors --- Side Effects, Psychological --- Factor, Psychological --- Factor, Psychosocial --- Factors, Psychosocial --- Psychological Factor --- Psychological Side Effect --- Psychologist --- Psychosocial Factor --- Side Effect, Psychological --- Internet addiction. --- Military Personnel. --- Behavior, Addictive. --- Internet. --- Compulsive Behavior. --- Computer Communication Networks. --- Impulsive Behavior. --- Persons. --- Computer Systems. --- Computing Methodologies. --- Behavior and Behavior Mechanisms. --- Information Science. --- Psychology. --- Treatment.

Listing 1 - 2 of 2
Sort by