Somos UnB
UnB
Última atualização do sistema: 05.06.2023
HOME
INDICADORES
CONTATO
SOBRE
Palavra-chave:
Cybersecurity
utilizada 54 vezes por 5 professores
Utilizada por 5 professores
Por ordem de relevância (total: 5)
Rafael Timóteo de Sousa Jr
Elaine Venson
Flávio Elias Gomes de Deus
Joao Jose Costa Gondim
Rafael Rabelo Nunes
Palavras-chave relacionadas
Palavra-chave relacionada é aquela que foi utilizada juntamente com "Cybersecurity"
Advanced Persistent Threats (APT)
Air traffic controllers
Android data extraction
Anti-Forensic Techniques
Attack Analisys
Attack Detection
Authentication
Automated analysis of malicious code
Biometrics
Blockchain
CAPTCHA
Chain of Custody
China National Vulnerability Database (CNVD)
Cloud Computing
Cloud Security
Consolidated Meta-Analytic Approach
Critical Security Controls (CSC)
Critical infrastructures
Cryptography
Cuckoo Sandbox
Cybercrime
Cybercrime Law
Cybersecurity
Cybersecurity Threats
DNS Tunnels
Data mining
Decision Making
Document and process digitalization
Domain Name System (DNS)
Electrical Grid
Embedded and cyber-physical systems
Energy trading
Feature engineering
Features pre-processing
General Data Protection Law - GDPR
Honeypots/Honeynets
IMT-2020
INTERNET BANKING
ISO 27000
Industrial Internet of Things - IIoT
Information Security
Internet of Things
Intrusion Detection Systems (IDS)
Malware Classification
Malware analysis
Microservices
Mobile Device Forensics
NIST National Vulnerability Database (NVD)
Natural Language Processing - NLP
Network Monitoring
Network Security
Nuclear power plants
Operating Systems Hardening
Privacy
Radio Frequency
Reliable Digital Archival Repository
Risk Identification
Robust Principal Component Analysis (RPCA)
Satellite TT&C
Security Architecture
Security Platform
Sentiment analysis
Smart Contracts
Smart sustainable cities
Software Defined Datacenter
Spectrum sharing
Touch Dynamics
Traffic analysis attack
User Behavior Analysis
Vulnerability Exploits
Wide and Deep Convolutional LSTM Autoencoders
Windows 10
anomaly detection
compliance
data analytics
data enrichment
deep packet inspection
dynamic analysis
evidence discovery
intrusion detection
machine learning
network forensics
nist
phishing detection
risk management
rootkit detection
smart grid
static analysis
threat intelligence
topics modeling
traffic analysis
CTIT UFMG