Browse Subject Headings
Cyber Threat Intelligence for Cloud Systems : A Comprehensive Guide to Becoming an Analyst
Cyber Threat Intelligence for Cloud Systems : A Comprehensive Guide to Becoming an Analyst
Click to enlarge
Author(s): D'Angelo, Gianni
ISBN No.: 9780443458736
Pages: 250
Year: 202610
Format: Trade Paper
Price: $ 252.00
Dispatch delay: Dispatched between 7 to 15 days
Status: Available (Forthcoming)

Gianni D'Angelo is an Associate Professor at the Department of Computer Science of the University of Salerno, Italy. Since November 19, 2025, he also qualified as First Level University Professor for the Sector 01/B1 - Computer Science. He received the M.S. degree (cum laude) in Computer Engineering, and the Ph.D. degree in Computer Science, applied electromagnetism and telecommunications from the University of Salerno, Salerno, Italy, in 1998 and 2003, respectively.He lectures ''Cybersecurity and Threat Intelligence for Cloud Systems", ''Computer Networks" and ''Computer Architecture" at the Department of Computer Science of the University of Salerno.


He has taught ''Fundamentals of Computer Science and Programming" at the Department of Industrial Engineering of the same University. From 2012 to 2019, he has been a Contract Professor of ''Elements of Computer Science'' at the Department of Law, Economics, Management and Quantitative Methods of the University of Sannio, Benevento, Italy.His research interests include the development and implementation of algorithms based on Artificial Intelligence, Deep Learning, Machine Learning, Explainable AI, and Parallel Programming, applied across various scientific and industrial domains -- primarily in Networking Security, E-Health, and IoT for Aerospace. He has gained experience in pattern recognition, neural networks, fuzzy logic, ANFIS systems, and genetic and evolutionary algorithms, with the aim of uncovering hidden information from data originating in big data contexts.Regarding Networking Security, cybersecurity challenges have been addressed at different implementation levels:a) Network level: by analyzing only the data flows of network traffic, mainly for Network Traffic Classification (NTC) and anomaly detection.b) Application level: by modeling the behavior of applications running on common platforms, such as Android.c) Social level: by modeling the behavior of entities involved in social communities, such as those in e-commerce platforms.The main drivers that have guided research activities in this field stem from the need to develop advanced security assessment systems and robust, efficient data communication mechanisms.


In particular, the research focuses on strengthening current methodologies for detecting cyber-attacks, malicious actions, and anomalies in communication systems at various implementation levels.


To be able to view the table of contents for this publication then please subscribe by clicking the button below...
To be able to view the full description for this publication then please subscribe by clicking the button below...
Browse Subject Headings