Search alternatives:
cyber intelligence » ambient intelligence (Expand Search)
Showing 21 - 40 results of 40 for search 'cyber intelligence', query time: 0.06s Refine Results
  1. 21
  2. 22
  3. 23
  4. 24
  5. 25

    EFFECTIVE THREAT INVESTIGATION FOR SOC ANALYSTS : The ultimate guide to examining various threats and attacker techniques using security logs / by Yahia, Mostafa, author 656270

    Published 2023
    “…You’ll also explore popular threat intelligence platforms such as VirusTotal, AbuseIPDB, and X-Force for investigating cyber threats and successfully build your own sandbox environment for effective malware analysis. …”
    Get full text
    Get full text
    software, multimedia
  6. 26

    “Better Networks” Project is Working to Improve Cybersecurity by Comeau, Kailen

    Published 2024
    “…In collaboration with the MIT Sociotechnical Systems Research Center and the Air Force, the Lincoln Laboratory Supercomputing Center is working to develop better sensors using Laboratory developed Dynamic Distributed Dimensional Data Model (D4M) technology and artificial intelligence algorithms to support defensive cyber operations.…”
    Get full text
    Article
  7. 27

    Cybersecurity Threats, Malware Trends, and Strategies : Discover risk mitigation strategies for modern threats to your organization / by Rains, Tim, author 656361, Youngblood, Timothy, writer of foreword 656362, Packt Publishing (Online service) 656336

    Published 2023
    “…By the end of this book, you will have a better understanding of the threat landscape, how to recognize good Cyber Threat Intelligence, and how to measure the effectiveness of your organization's cybersecurity strategy.…”
    Get full text
    Get full text
    software, multimedia
  8. 28
  9. 29

    Malicious JavaScript detection web service by Peng, Lunan

    Published 2016
    “…Thus, the detection and prevention of Malicious JavaScript has always been an important research topics in cyber security. Many studies on malicious JavaScript detection were carried out and various detection tools were developed. …”
    Get full text
    Final Year Project (FYP)
  10. 30
  11. 31

    Security Orchestration, Automation, and Response for Security Analysts : Learn the secrets of SOAR to improve MTTA and MTTR and strengthen your organization's security posture / by Kovacevic, Benjamin, author 656337, Packt Publishing (Online service) 656336

    Published 2023
    “…You'll start with a refresher on the importance of understanding cyber security, diving into why traditional tools are no longer helpful and how SOAR can help. …”
    Get full text
    Get full text
    software, multimedia
  12. 32
  13. 33
  14. 34
  15. 35
  16. 36
  17. 37
  18. 38
  19. 39
  20. 40