Review of Artificial Intelligence Cyber Threat Assessment Techniques for Increased System Survivability

作者: Nikolaos Doukas , Peter Stavroulakis , Nikolaos Bardis

DOI: 10.1007/978-3-030-62582-5_7

关键词: Computer securityCyber threatsSurvivabilityComputer science

摘要:

参考文章(13)
Mamoun Alazab, Sitalakshmi Venkatraman, Paul Watters, Moutaz Alazab, Information Security Governance IT Security Governance Innovations. pp. 293- 315 ,(2013) , 10.4018/978-1-4666-2083-4.CH011
Mamoun Alazab, Robert Layton, Roderic Broadhurst, Brigitte Bouhours, Malicious Spam Emails Developments and Authorship Attribution 2013 Fourth Cybercrime and Trustworthy Computing Workshop. pp. 58- 68 ,(2013) , 10.1109/CTC.2013.16
Ahmad Azab, Robert Layton, Mamoun Alazab, Jonathan Oliver, None, Mining Malware to Detect Variants 2014 Fifth Cybercrime and Trustworthy Computing Conference. pp. 44- 53 ,(2014) , 10.1109/CTC.2014.11
M Asif Khan, Mureed Hussain, None, Cyber security quantification model security of information and networks. ,vol. 3, pp. 142- 148 ,(2010) , 10.1145/1854099.1854130
Jereme N. Haack, Glenn A. Fink, Wendy M. Maiden, A. David McKinnon, Steven J. Templeton, Errin W. Fulp, Ant-Based Cyber Security international conference on information technology: new generations. pp. 918- 926 ,(2011) , 10.1109/ITNG.2011.159
Konstantinos Demertzis, Lazaros Iliadis, A Bio-Inspired Hybrid Artificial Intelligence Framework for Cyber Security Springer, Cham. pp. 161- 193 ,(2015) , 10.1007/978-3-319-18275-9_7
Ahmad Azab, Mamoun Alazab, Mahdi Aiash, Machine Learning Based Botnet Identification Traffic trust, security and privacy in computing and communications. pp. 1788- 1794 ,(2016) , 10.1109/TRUSTCOM.2016.0275
Domhnall Carlin, Philip O’Kane, Sakir Sezer, Dynamic Analysis of Malware using Run Time Opcodes Springer, Cham. pp. 99- 125 ,(2017) , 10.1007/978-3-319-59439-2_4
Nikolaos Doukas, Technologies for Greener Internet of Things Systems Springer, Cham. pp. 23- 42 ,(2017) , 10.1007/978-3-319-55595-9_2
Irina Măriuca Asăvoae, Jorge Blasco, Thomas M. Chen, Harsha Kumara Kalutarage, Igor Muttik, Hoang Nga Nguyen, Markus Roggenbach, Siraj Ahmed Shaikh, Detecting Malicious Collusion Between Mobile Software Applications: The Android TM Case Springer, Cham. pp. 55- 97 ,(2017) , 10.1007/978-3-319-59439-2_3