The threat landscape is evolving with tremendous speed. We are facing an extremely fast-growing attack surface with a diversity of attack vectors, a clear asymmetry between attackers and defenders, billions of connected IoT devices, mostly reactive detection and mitigation approaches, and finally big data challenges. The clear asymmetry of attacks and the enormous amount of data are additional arguments to make it necessary to rethink cybersecurity approaches in terms of reducing the attack surface, to make the attack surface dynamic, to automate the detection, risk assessment, and mitigation, and to investigate the prediction and prevention of attacks with the utilization of emerging technologies like blockchain, artificial intelligence an...
This paper is devoted to the analysis of modern trends in economic cybersecurity. We analysed the dy...
The Internet of Things (IoT) aims to transform everyday physical objects into an interconnected ecos...
In the new cyber landscape, the legal rules apply only to defenders. Even nonprimary countries and c...
This book provides readers with up-to-date research of emerging cyber threats and defensive mechanis...
In the world of evolving technologies, we are being driven by online transaction, AI technologies an...
Cybersecurity is an active and important area of study, practice, and research today. It spans vario...
The increasing prevalence of IoT devices has brought about numerous security challenges due to their...
2018-07-08For a number of reasons, concerns surrounding security and safety have intensified. Contr...
This book offers the latest research results on blockchain technology and its application for cybers...
This book on computer security threats explores the computer security threats and includes a broad s...
Cybersecurity is an extremely important area which is rapidly evolving, necessarily, to meet current...
The modern world is experiencing a new industrial revolution, known as industry 4.0, where machines,...
As a new area of technology, the Internet of Things (IoT) is a flagship and promising paradigm for i...
This book presents the latest advances in machine intelligence and big data analytics to improve ear...
Currently, the majority of international economic, commercial, cultural, social, and governmental co...
This paper is devoted to the analysis of modern trends in economic cybersecurity. We analysed the dy...
The Internet of Things (IoT) aims to transform everyday physical objects into an interconnected ecos...
In the new cyber landscape, the legal rules apply only to defenders. Even nonprimary countries and c...
This book provides readers with up-to-date research of emerging cyber threats and defensive mechanis...
In the world of evolving technologies, we are being driven by online transaction, AI technologies an...
Cybersecurity is an active and important area of study, practice, and research today. It spans vario...
The increasing prevalence of IoT devices has brought about numerous security challenges due to their...
2018-07-08For a number of reasons, concerns surrounding security and safety have intensified. Contr...
This book offers the latest research results on blockchain technology and its application for cybers...
This book on computer security threats explores the computer security threats and includes a broad s...
Cybersecurity is an extremely important area which is rapidly evolving, necessarily, to meet current...
The modern world is experiencing a new industrial revolution, known as industry 4.0, where machines,...
As a new area of technology, the Internet of Things (IoT) is a flagship and promising paradigm for i...
This book presents the latest advances in machine intelligence and big data analytics to improve ear...
Currently, the majority of international economic, commercial, cultural, social, and governmental co...
This paper is devoted to the analysis of modern trends in economic cybersecurity. We analysed the dy...
The Internet of Things (IoT) aims to transform everyday physical objects into an interconnected ecos...
In the new cyber landscape, the legal rules apply only to defenders. Even nonprimary countries and c...