The Art of Cyber Defense From Risk Assessment to Threat Intelligence

The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats.

Detalles Bibliográficos
Otros Autores: Baddi, Youssef, editor (editor)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Boca Raton, FL : CRC Press [2025]
Edición:First edition
Colección:Advances in Cybersecurity Management Series
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009869112906719
Tabla de Contenidos:
  • Cover
  • Half Title
  • Title Page
  • Copyright Page
  • Table of Contents
  • Preface
  • Introduction
  • About the Editor
  • List of Contributors
  • Part I: Foundations of cyber defense and risk assessment
  • 1 AI-powered strategies for advanced malware detection and prevention
  • 2 Advancing malware classification with hybrid deep learning: A comprehensive analysis using DenseNet and LSTM
  • 3 A comprehensive overview of AI-driven behavioral analysis for security in Internet of Things
  • 4 A deep dive into IoT security: Machine learning solutions and research perspectives
  • 5 Exploring Blockchain techniques for enhancing IoT security and privacy: A comprehensive analysis
  • Part II: Analyzing and responding to emerging threats
  • 6 Integrating security analysis module for proactive threat intelligence
  • 7 Security study of Web applications through a white-box audit approach: A case study
  • 8 Case study method: A step-by-step black-box audit for security study of Web applications
  • 9 Security in cloud-based IoT: A survey
  • 10 Exploring IoT penetration testing: From fundamentals to practical setup
  • 11 A fuzzy logic-based trust system for detecting selfish nodes and encouraging cooperation in Optimized Link State Routing protocol
  • 12 Collaborative Cloud-SDN architecture for IoT privacy-preserving based on federated learning
  • 13 An adaptive cybersecurity strategy based on game theory to manage emerging threats in the SDN infrastructure
  • Part III: Human-centric risk mitigation approaches
  • 14 A human-centric approach to cyber risk mitigation
  • 15 Human factors in cyber defense
  • 16 Security operation center: Toward a maturity model
  • Index.