网络安全态势感知研究综述
席荣荣, 云晓春, 金舒原, 张永铮 - 计算机应用, 2012 - joca.cn
网络安全态势感知(SA) 的研究对于提高网络的监控能力, 应急响应能力和预测网络安全的发展
趋势具有重要的意义. 基于态势感知的概念模型, 详细阐述了态势感知的三个主要研究内容 …
趋势具有重要的意义. 基于态势感知的概念模型, 详细阐述了态势感知的三个主要研究内容 …
Visualization design for immediate high-level situational assessment
RF Erbacher - Proceedings of the ninth international symposium on …, 2012 - dl.acm.org
We present the design of a visualization technique based on the results of a human in the
loop process, which relied on network managers and network analysts. This visualization …
loop process, which relied on network managers and network analysts. This visualization …
idsNETS: An experimental platform to study situation awareness for intrusion detection analysts
In this paper we present a new human-in-the-loop simulation designed to help better
understand the role of the human in a cyber-analysis task. Based on qualitative research …
understand the role of the human in a cyber-analysis task. Based on qualitative research …
Designing a cyber attack information system for national situational awareness
Abstract Information and communication technology (ICT) systems underpin many of today's
societal functions and economic development. Consequently, protecting a nation's ICT …
societal functions and economic development. Consequently, protecting a nation's ICT …
From individual decisions from experience to behavioral game theory: lessons for cybersecurity
C Gonzalez - Moving Target Defense II: Application of Game Theory …, 2012 - Springer
This chapter discusses a central challenge arising from the success of modeling human
behavior in making decisions from experience: our ability to scale these models up to …
behavior in making decisions from experience: our ability to scale these models up to …
Dynamic intrusion detection in resource-constrained cyber networks
K Liu, Q Zhao - 2012 IEEE International Symposium on …, 2012 - ieeexplore.ieee.org
We consider a large-scale cyber network with N components. Each component is either in a
healthy state (0) or an abnormal state (1). Due to intrusions, the state of each component …
healthy state (0) or an abnormal state (1). Due to intrusions, the state of each component …
Information management and sharing for national cyber situational awareness
F Skopik, T Bleier, R Fiedler - … of the Information Security Solutions Europe …, 2012 - Springer
ICT has been integrated massively in business processes in recent years, thus producing an
enormous dependency on these technologies. The potential impact of these dependencies …
enormous dependency on these technologies. The potential impact of these dependencies …
[图书][B] An interdisciplinary evaluation of transactive memory in distributed cyber teams
VF Mancuso - 2012 - search.proquest.com
In the modern workplace, collaboration is no longer only a face-to-face process. When
working together, it is common for teams to rely on technology and operate across …
working together, it is common for teams to rely on technology and operate across …
Cyber situation awareness through Instance-Based Learning: Modeling the security analyst in a cyber-attack scenario
V Dutt, C Gonzalez - Situational Awareness in Computer Network …, 2012 - igi-global.com
In a corporate network, the situation awareness (SA) of a security analyst is of particular
interest. The current work describes a cognitive Instance-Based Learning (IBL) model of an …
interest. The current work describes a cognitive Instance-Based Learning (IBL) model of an …
An introduction to computational awareness
Q Zhao - 4th International Conference on Awareness Science …, 2012 - ieeexplore.ieee.org
In 2009, we organized the first International Workshop on Aware Computing. During the
workshop, Goutam Chakraborty, Runhe Huang, Robert Kozma, Jianhua Ma, Tadahiko …
workshop, Goutam Chakraborty, Runhe Huang, Robert Kozma, Jianhua Ma, Tadahiko …