![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Data Science in Cybersecurity and Cyberthreat Intelligence, 2020
- Leslie F. Sikos
, Kim-Kwang Raymond Choo
:
Data Science in Cybersecurity and Cyberthreat Intelligence. Intelligent Systems Reference Library 177, Springer 2020, ISBN 978-3-030-38787-7 - Leslie F. Sikos
:
The Formal Representation of Cyberthreats for Automated Reasoning. 1-12 - Mohammed Almukaynizi
, Ericsson Marin, Malay Shah, Eric Nunes, Gerardo I. Simari, Paulo Shakarian:
A Logic Programming Approach to Predict Enterprise-Targeted Cyberattacks. 13-32 - Bo Sun, Takeshi Takahashi, Lei Zhu, Tatsuya Mori
:
Discovering Malicious URLs Using Machine Learning Techniques. 33-60 - Igor V. Kotenko, Igor Saenko, Alexander Branitskiy:
Machine Learning and Big Data Processing for Cybersecurity Data Analysis. 61-85 - James Jin Kang:
Systematic Analysis of Security Implementation for Internet of Health Things in Mobile Health Networks. 87-113 - Mike Johnstone, Matthew Peacock:
Seven Pitfalls of Using Data Science in Cybersecurity. 115-129
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.