
This chapter provides a study regarding the important topics of cyber threat intrusion detection and prevention with regard to identifying malicious incidents, logging information about them, attempting to stop them and reporting the identified malicious attack to the incident response teams. This requires well-selected investigations of cyber threat attacks because cyber-attackers are seeking out and exploiting computer systems and/or networks, application vulnerabilities, and others to attack, causing serious problems for cyber threat attacked public and private organizations’ computer systems or networks. Thus, intrusion detection and prevention strategies are becoming an important knowledge to decide about the right approach to secure critical and crucial infrastructure in public and private organizations against malicious cyber threat attacks.
| citations This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 14 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Top 10% | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Top 10% | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Top 10% |
