↓ Skip to main content

Cyber Threat Intelligence

Overview of attention for book
Cover of 'Cyber Threat Intelligence'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Cyber Threat Intelligence: Challenges and Opportunities
  3. Altmetric Badge
    Chapter 2 Machine Learning Aided Static Malware Analysis: A Survey and Tutorial
  4. Altmetric Badge
    Chapter 3 Application of Machine Learning Techniques to Detecting Anomalies in Communication Networks: Datasets and Feature Selection Algorithms
  5. Altmetric Badge
    Chapter 4 Application of Machine Learning Techniques to Detecting Anomalies in Communication Networks: Classification Algorithms
  6. Altmetric Badge
    Chapter 5 Leveraging Machine Learning Techniques for Windows Ransomware Network Traffic Detection
  7. Altmetric Badge
    Chapter 6 Leveraging Support Vector Machine for Opcode Density Based Detection of Crypto-Ransomware
  8. Altmetric Badge
    Chapter 7 BoTShark: A Deep Learning Approach for Botnet Traffic Detection
  9. Altmetric Badge
    Chapter 8 A Practical Analysis of the Rise in Mobile Phishing
  10. Altmetric Badge
    Chapter 9 PDF-Malware Detection: A Survey and Taxonomy of Current Techniques
  11. Altmetric Badge
    Chapter 10 Adaptive Traffic Fingerprinting for Darknet Threat Intelligence
  12. Altmetric Badge
    Chapter 11 A Model for Android and iOS Applications Risk Calculation: CVSS Analysis and Enhancement Using Case-Control Studies
  13. Altmetric Badge
    Chapter 12 A Honeypot Proxy Framework for Deceiving Attackers with Fabricated Content
  14. Altmetric Badge
    Chapter 13 Investigating the Possibility of Data Leakage in Time of Live VM Migration
  15. Altmetric Badge
    Chapter 14 Forensics Investigation of OpenFlow-Based SDN Platforms
  16. Altmetric Badge
    Chapter 15 Mobile Forensics: A Bibliometric Analysis
  17. Altmetric Badge
    Chapter 16 Emerging from the Cloud: A Bibliometric Analysis of Cloud Forensics Studies
Attention for Chapter 3: Application of Machine Learning Techniques to Detecting Anomalies in Communication Networks: Datasets and Feature Selection Algorithms
Altmetric Badge

Mentioned by

patent
1 patent

Readers on

mendeley
40 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Application of Machine Learning Techniques to Detecting Anomalies in Communication Networks: Datasets and Feature Selection Algorithms
Chapter number 3
Book title
Cyber Threat Intelligence
Published by
Springer, Cham, January 2018
DOI 10.1007/978-3-319-73951-9_3
Book ISBNs
978-3-31-973950-2, 978-3-31-973951-9
Authors

Qingye Ding, Zhida Li, Soroush Haeri, Ljiljana Trajković, Ding, Qingye, Li, Zhida, Haeri, Soroush, Trajković, Ljiljana

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 40 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 40 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 10 25%
Student > Master 7 18%
Other 3 8%
Lecturer > Senior Lecturer 2 5%
Student > Doctoral Student 2 5%
Other 6 15%
Unknown 10 25%
Readers by discipline Count As %
Computer Science 19 48%
Engineering 6 15%
Unspecified 1 3%
Social Sciences 1 3%
Philosophy 1 3%
Other 0 0%
Unknown 12 30%