Keyphrases
Automated Intrusion Response
33%
Autonomous Response
33%
Comprehensive Approach
33%
Context-aware
100%
Contextual Roles
33%
Continuous Monitoring
33%
Cybersecurity
33%
Detection Method
33%
Dynamic Environment
33%
Dynamically Adjust
33%
Effective Operation
33%
Emerging Threats
33%
Evolving Networks
33%
Experimental Validation
33%
Hierarchical Markov Model
66%
Internet of Things
33%
Internet of Things Environment
33%
Internet of Things Networks
33%
Internet of Things System
66%
Machine Learning Algorithms
33%
Machine Learning Techniques
33%
Monitoring Applications
33%
MoUs
33%
Native Ecosystems
100%
Network Condition
33%
Real-time Security
33%
Response Monitoring
33%
Response Plan
33%
Response-ability
33%
Safety Resilience
33%
Security Concerns
33%
Security Vulnerabilities
33%
Self-healing
100%
Self-healing Capability
33%
Self-healing Mechanism
33%
System Information
33%
Widespread Adoption
33%
Computer Science
Autonomous Response
20%
Continuous Monitoring
20%
Cybersecurity
20%
Detecting Intrusion
20%
Dynamic Environment
20%
Emerging Threat
20%
Information Systems
20%
Internet-Of-Things
100%
Intrusion Detection System
20%
Machine Learning Algorithm
20%
Machine Learning Technique
20%
Monitoring Application
20%
Network Condition
20%
Security Concern
20%
Security Vulnerability
20%
Widespread Adoption
20%