TY - GEN N2 - This book presents innovative ideas, cutting-edge findings, and novel techniques, methods, and applications in a broad range of cybersecurity and cyberthreat intelligence areas. As our society becomes smarter, there is a corresponding need to be able to secure our cyberfuture. The approaches and findings described in this book are of interest to businesses and governments seeking to secure our data and underpin infrastructures, as well as to individual users. DO - 10.1007/978-3-030-25128-4 DO - 10.1007/978-3-030-25 DO - doi AB - This book presents innovative ideas, cutting-edge findings, and novel techniques, methods, and applications in a broad range of cybersecurity and cyberthreat intelligence areas. As our society becomes smarter, there is a corresponding need to be able to secure our cyberfuture. The approaches and findings described in this book are of interest to businesses and governments seeking to secure our data and underpin infrastructures, as well as to individual users. T1 - International Conference on Applications and Techniques in Cyber Intelligence ATCI 2019 :Applications and Techniques in Cyber Intelligence / AU - Abawajy, Jemal H., AU - Choo, Kim-Kwang Raymond, AU - Islam, Rafiqul, AU - Xu, Zheng, AU - Atiquzzaman, Mohammed, VL - volume 1017 CN - QA76.9.A25 ID - 922465 KW - Cyber intelligence (Computer security) KW - Computer security SN - 9783030251284 SN - 3030251284 TI - International Conference on Applications and Techniques in Cyber Intelligence ATCI 2019 :Applications and Techniques in Cyber Intelligence / LK - https://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-030-25128-4 UR - https://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-030-25128-4 ER -