Somos UnB
UnB
Última atualização do sistema: 15.12.2024
HOME
INDICADORES
CONTATO
SOBRE
Palavra-chave:
Cybersecurity
utilizada 58 vezes por 8 professores
Utilizada por 8 professores
Por ordem de relevância (total: 8)
Rafael Timóteo de Sousa Jr
Joao Jose Costa Gondim
André Luiz Marques Serrano
Claudio Gottschalg Duque
Elaine Venson
Flávio Elias Gomes de Deus
Rafael Rabelo Nunes
Ricardo Staciarini Puttini
Palavras-chave relacionadas
Palavra-chave relacionada é aquela que foi utilizada juntamente com "Cybersecurity"
Advanced Persistent Threats (APT)
Air traffic controllers
Android data extraction
Anti-Forensic Techniques
Attack Analisys
Attack Detection
Autoencoder
Automated analysis of malicious code
Biometrics
Blockchain
CAPTCHA
Chain of Custody
China National Vulnerability Database (CNVD)
Cloud Computing
Cloud Security
Compliance
Consolidated Meta-Analytic Approach
Countermeasures
Critical Security Controls (CSC)
Critical infrastructures
Cryptography
Cuckoo Sandbox
Cybercrime
Cybercrime Law
Cybersecurity
Cybersecurity Threats
DNS Tunnels
Data Enrichment
Data mining
Decision making
Document and process digitalization
Domain Name System (DNS)
Dynamic Analysis
Electrical Grid
Embedded and cyber-physical systems
Energy trading
Feature Engineering
Features pre-processing
General Data Protection Law - GDPR
Honeypots/Honeynets
IDS
IMT-2020
INTERNET BANKING
ISO 27000
Industrial Internet of Things - IIoT
Information Security
Internet of Things
Intrusion Detection
Intrusion Detection Systems (IDS)
Machine Learning
Malware Classification
Malware analysis
Microservices
Mobile Device Forensics
NIST
NIST National Vulnerability Database (NVD)
Natural Language Processing - NLP
Network Monitoring
Network Security
Nuclear power plants
Operating Systems Hardening
Phishing Detection
Privacy
Radio frequency
Reliable Digital Archival Repository
Risk Identification
Robust Principal Component Analysis (RPCA)
SOC
Satellite TT&C
Security Architecture
Security Platform
Sentiment analysis
Smart Contracts
Smart Grid
Smart sustainable cities
Software Defined Datacenter
Spectrum sharing
Topics Modeling
Touch Dynamics
Traffic analysis attack
User Behavior Analysis
Vulnerability Exploits
Wide and Deep Convolutional LSTM Autoencoders
Windows 10
anomaly detection
authentication
data analytics
data breach
deep packet inspection
evidence discovery
feature extraction
feature selection
natural language processing
network forensics
risk management
rootkit detection
static analysis
threat intelligence
traffic analysis
CTIT UFMG