Security Technologies and Methods for Advanced Cyber Threat Intelligence, Detection and Mitigation
Home > Computing and Information Technology > Computer security > Security Technologies and Methods for Advanced Cyber Threat Intelligence, Detection and Mitigation: (NowOpen)
Security Technologies and Methods for Advanced Cyber Threat Intelligence, Detection and Mitigation: (NowOpen)

Security Technologies and Methods for Advanced Cyber Threat Intelligence, Detection and Mitigation: (NowOpen)


     0     
5
4
3
2
1



International Edition


X
About the Book

Table of Contents:
1. How to Design and Set Architecture for Advanced Cyber-Threat Intelligence, Detection, and Mitigation Platforms 2. The Cyber-Trust Paradigm of Procedural Aspects for Cybersecurity Research Impact Assessment 3. Cyber-Threat Intelligence 4. Moving–Target Defense Techniques for Mitigating Sophisticated IoT Threats 5. Cyber-Threat Detection in the IoT 6. Utilising Honeypots and Machine Learning to Mitigate Unknown Threats in IoT 7. Towards Post-Quantum Blockchain Platforms 8. Trust Management System Architecture for the Internet of Things 9. Cyber-Trust Evaluation Process 10. Smart Home Testbeds for Business 11. Securing Today’s Complex Digital Realities 12. Security and Privacy in Digital Twins

About the Author :
Dr. Gohar Sargsyan is a Director at CGI Inc. with a role of ICT Innovation and Partnership collaboration lead. Last years she was focusing on the Security domain covering Cyber Security, Space Security, Border Security, Digital Policing, Public Safety, Security and Privacy and Security, Security in Digital Twins, Financial Crime and Fraud Detection, Blockchain and Sustainable Finance.She has successful track record in different industries and has extensive experience in Strategic Advisory, stakeholder management and business/IT alignment. Started from 2002 she is an appointed EU expert for the European Commission (EC) IT Innovation Programmes where she assesses new digital and technological solutions for all industries offered by EU and international consortia. She partners with leading business and science organisations in selected EU programmes for creation, implementation and delivery of complex platforms and services, among them Cyber-Trust, where she was the exploitation and innovation leader. She is a stakeholder member on EU panels and high level think tanks on Future Internet, IPv6, EU Cybersecurity, Open Innovation 2.0, EU Green Deal and Europe Digital among others. She is a founding member of Open Innovation Strategy and Policy Group under support of EC DG CONNECT since 2009 and Innovation Luminary Academy and Awards since 2013.Dr. Sargsyan holds MS (Master of Science) of Applied Mathematics at Yerevan State University with Master Thesis on Cryptography, MS CIS (Master and Silences Degree of Computer and Information Sciences) and MBA at UCLA, then she also accomplished her PhD on Informatics and Automation Problems Optimization and Mathematical Modeling with a project of Video Conferencing for Poor Internet Bandwidth. She achieved a number of qualification certificates on Security, Data, Business and Sustainability Leadership. She is an inventor with IP ownership. She is a regular (keynote) speaker and chairwoman of international events and sessions. To name a few, she is a steering committee member of IEEE CSR, IEEE SecSoft, Open Innovation 2.0, World Smart Capital initiative. She publishes regularly in international prominent business and scientific venues, so far being an (co)author and co(editor) of more than 80 publications including books. Mr. Dimitrios Kavallieros co-supervises the cybersecurity research team of the MultiMoDal Data Fusion and Analytics Group (M4D) of the Multimedia Knowledge and Social Media Analytics Laboratory (MKLab) which is part of the Informatics and Telematics Institute (ITI) of the Center of Research and Technology, Hellas (CERTH, Greece). He is also a senior research associate at M4D focusing on cybersecurity research and innovation technologies.Prior to this role, he was a programme coordinator and a research associate at the Center for Security Studies - KEMEA of the Hellenic Ministry of Citizen Protection. He holds an MSc in Ethical Hacking and Computer Security from the University of Abertay. He is currently PhD candidate at University of Peloponnese. He has co-edited a book on technologies strengthening security (Technology Development for Security Practitioners) and he has more than 25 articles in conference proceedings, journals and book chapters covering mainly cybersecurity, cyberterrorism and digital forensics topics.Mr. Kavallieros has participated in several European and National funded research projects assuming different roles such as senior researcher, coordinator, project manager, technical manager, scientific leader and mainly focused on Cybersecurity, Cybercrime and Cyberterrorism, IoT & Cloud Security/Forensics, Digital Forensics and Blockchain technology topics. He is an invited expert to different selected stakeholders' groups and initiatives and a speaker in cybersecurity events to share his experience in all the security programmes, testbeds, results and way ahead towards better and more secure world. He was the project coordinator of the EU H2020-project Cyber-Trust on IoT cybersecurity and of the EU H2020-project FORESIGHT on cybersecurity preparedness, cyber range and simulation and the innovation manager of the EU H2020-project PROPHETS on human factors and new methods to prevent, investigate and mitigate cybercriminal behaviors. In addition, he was the project manager of several H2020 projects in KEMEA, including but not limited to AIDA, LOCARD and SPARTA. Now in CERTH he is a member of the Scientific and Technical management team of SECANT and CTC projects. Dr. Nicholas E. Kolokotronis is an Associate Professor and the Head of the Cryptography and Security Group at the Department of Informatics and Telecommunications, University of the Peloponnese. He received his B.Sc. in mathematics from the Aristotle University of Thessaloniki, Greece, in 1995, an M.Sc. in highly efficient algorithms (highest honors) in 1998 and a Ph.D. in cryptography in 2003, both from the National and Kapodistrian University of Athens. Since 2004, he has held visiting positions at the University of Piraeus, University of the Peloponnese, the National and Kapodistrian University of Athens, and the Open University of Cyprus.During 2002-2004, he was with the European Dynamics S.A., Greece, as a security consultant. He has been a member of working groups for the provisioning of professional cyber-security training to large organizations, including the Hellenic Telecommunications and Posts Commission (EETT). Dr. Kolokotronis has published more than 100 papers in international scientific journals, conferences, and books and has participated in more than 25 EU-funded and national research and innovation projects. In Cyber-Trust, he was the technical coordinator. He has been a co-chair of conferences (IEEE CSR 2021, 2022), workshops (IEEE SecSoft 2019, IEEE CSRIoT 2019, 2020, and ACM EPESec 2020), and special sessions focusing on IoT security. Moreover, he has been a TPC member in many international conferences, incl.IEEE ISIT, IEEE GLOBECOM, IEEE ICC, ARES, and ISC. He is currently a Guest Editor in "Engineering - cyber security, digital forensics and resilience" area of Springer's Applied Sciences Journal (since 2019) and in the Reviewer Board of MDPI's Cryptography journal (since 2020), whereas he has been an Associate Editor of the EURASIP Journal on Wireless Communications and Networking (2009-17) and a regular reviewer for a number of prestigious journals, incl. IEEE TIFS, IEEE TIT, Springer's DCC, etc. His research interests span the broad areas of cryptography, security, and coding theory.


Best Sellers


Product Details
  • ISBN-13: 9781680838343
  • Publisher: now publishers Inc
  • Publisher Imprint: now publishers Inc
  • Height: 234 mm
  • No of Pages: 244
  • Returnable: N
  • Returnable: N
  • Weight: 524 gr
  • ISBN-10: 1680838342
  • Publisher Date: 25 Mar 2022
  • Binding: Hardback
  • Language: English
  • Returnable: N
  • Returnable: N
  • Series Title: NowOpen
  • Width: 156 mm


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Security Technologies and Methods for Advanced Cyber Threat Intelligence, Detection and Mitigation: (NowOpen)
now publishers Inc -
Security Technologies and Methods for Advanced Cyber Threat Intelligence, Detection and Mitigation: (NowOpen)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Security Technologies and Methods for Advanced Cyber Threat Intelligence, Detection and Mitigation: (NowOpen)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!