Skip to main navigation
Skip to search
Skip to main content
Charles Sturt University Research Output Home
Home
Researchers
Research Organisations
Research Outputs
Datasets
Prizes
Activities
Press/Media
Impacts
Equipment
Search by expertise, name or affiliation
Cyber Diversity Index for Autonomous Anomaly Management
Michael Donevski
Research output
:
Thesis
›
Doctoral Thesis
642
Downloads (Pure)
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'Cyber Diversity Index for Autonomous Anomaly Management'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Keyphrases
Diversity Index
100%
Cyber
100%
Anomaly Management
100%
Cybersecurity
42%
System State
28%
Anomaly Detection
28%
Cyber-attacks
28%
Behavioral Profile
28%
Normal System
28%
Cybersecurity Automation
28%
Measurable Solution
28%
Information Technology
14%
Dynamic Relationship
14%
Normality
14%
Change of Measure
14%
Machine Learning
14%
Complex Information
14%
Track Changes
14%
Security Solutions
14%
Self-managing
14%
Biodiversity Assessment
14%
Subject Matter Experts
14%
Data Entry
14%
Ecological Environment
14%
Graph-based
14%
Antivirus
14%
Internet of Things
14%
Traditional Learning
14%
Intrusion Detection System
14%
Zero-day
14%
Application System
14%
Cyber-physical Systems
14%
Operational Environment
14%
Business Applications
14%
Operational Technology
14%
Human-readable
14%
Society 5.0
14%
Cybersecurity Controls
14%
Application Whitelisting
14%
System Call
14%
Diverse Relationships
14%
Exponential Technologies
14%
Machine Learning Security
14%
Database Update
14%
Real-time Solution
14%
Diversity Changes
14%
Intelligent Automation
14%
Internet Plus
14%
Firewall Rules
14%
Indicators of Compromise
14%
Cybersecurity Analysts
14%
System Signature
14%
Diversity Dynamics
14%
Cyber Anomaly
14%
Application Lifecycle
14%
Flexible Application
14%
Industry 4.0 (I4.0)
14%
Vulnerability Management
14%
Continuous Sampling
14%
Widespread Adoption
14%
Technology Advancement
14%
Normal Baselines
14%
Application Integrity
14%
Entropy-based Anomaly Detection
14%
Automation Failure
14%
Computer Science
Cybersecurity
100%
Anomaly Detection
28%
Cyber Attack
28%
Machine Learning
28%
Learning System
28%
Widespread Adoption
14%
Security Solution
14%
Emerging Technology
14%
Technology Environment
14%
Antivirus
14%
Anomaly-Based Detection
14%
Technology Advance
14%
Intrusion Detection System
14%
Application System
14%
System Calls
14%
Cyber Physical Systems
14%
Operational Environment
14%
Industry 4.0
14%
Vulnerability Management
14%
Firewall
14%
Subject Matter Expert
14%
Business Application
14%
Internet-Of-Things
14%