Security challenges in IT infrastructure for cybersecurity curriculum support
Abstract
References
Index Terms
- Security challenges in IT infrastructure for cybersecurity curriculum support
Recommendations
Intrusion Detection: Tools, Techniques and Strategies
SIGUCCS '14: Proceedings of the 42nd annual ACM SIGUCCS conference on User servicesIntrusion detection is an important aspect of modern cyber-enabled infrastructure in identifying threats to digital assets. Intrusion detection encompasses tools, techniques and strategies to recognize evolving threats thereby contributing to a secure ...
Methodologies and Challenges of Cybersecurity Techniques in Cloud Computing Environment
ICIMMI '23: Proceedings of the 5th International Conference on Information Management & Machine IntelligenceAbstract: In Cybersecurity is a practice aimed to protect the systems, data, and digital information of people on the internet from unauthorized malicious attacks by cybercriminals. Cybersecurity encompasses a wide range of methodologies and faces ...
Adversarial attacks on machine learning-based cyber security systems: a survey of techniques and defences
Machine learning (ML) has been increasingly adopted in the field of cyber security to enhance the detection and prevention of cyber threats. However, recent studies have demonstrated that ML-based cyber security systems are vulnerable to adversarial ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
- General Chair:
- Carol Rhodes,
- Program Chairs:
- Gordana Brouilette,
- Gale Fritsche,
- Cindy Stewart
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 311Total Downloads
- Downloads (Last 12 months)3
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in