Cyber situational awareness–a systematic review of the literature

U Franke, J Brynielsson - Computers & security, 2014 - Elsevier
Cyber situational awareness is attracting much attention. It features prominently in the
national cyber strategies of many countries, and there is a considerable body of research …

On fingerprinting probing activities

E Bou-Harb, M Debbabi, C Assi - computers & security, 2014 - Elsevier
Motivated by recent cyber attacks that were facilitated through probing, limited cyber security
intelligence and the lack of accuracy that is provided by scanning detection systems, this …

Cognition and technology

C Gonzalez, N Ben-Asher, A Oltramari… - Cyber defense and …, 2014 - Springer
As the previous chapters emphasized, the human cognition—and the technology necessary
to support it—are central to Cyber Situational Awareness. Therefore, this chapter focuses on …

Sonification aesthetics and listening for network situational awareness

P Vickers, C Laing, M Debashi, T Fairfax - arXiv preprint arXiv:1409.5282, 2014 - arxiv.org
This paper looks at the problem of using sonification to enable network administrators to
maintaining situational awareness about their network environment. Network environments …

Network resilience with reusable management patterns

A Schaeffer-Filho, P Smith, A Mauthe… - IEEE …, 2014 - ieeexplore.ieee.org
Troubleshooting of problems, such as attacks and misconfigurations, and ensuring the
resilience of networks is a significant issue for network operators. It increasingly requires the …

Beyond technical data-a more comprehensive situational awareness fed by available intelligence information

A Kornmaier, F Jaouën - 2014 6th International Conference On …, 2014 - ieeexplore.ieee.org
Information on cyber incidents and threats are currently collected and processed with a
strong technical focus. Threat and vulnerability information alone are not a solid base for …

Attack visualisation for cyber-security situation awareness

M Evangelopoulou, CW Johnson - 2014 - IET
This paper illustrates how Situation Awareness measurement techniques can be transferred
and adopted to a Cloud Computing network environment, specifically concerning the …

Mr-triage: Scalable multi-criteria clustering for big data security intelligence applications

Y Shen, O Thonnard - … Conference on Big Data (Big Data), 2014 - ieeexplore.ieee.org
Security companies have recently realised that mining massive amounts of security data can
help generate actionable intelligence and improve their understanding of Internet attacks. In …

A method of network security situation prediction based on AC-RBF neural network.

LI Fangwei, Z Bo, ZHU Jiang… - Journal of Chongqing …, 2014 - search.ebscohost.com
To grasp the trend of network security, a method of network security situation prediction
(NSSP) based on adaptive clustering radical basis function (AC-RBF) neural network is …

Synthesizing perception based on analysis of cyber attack environments

S Sunny, V Pavithran… - … Conference on Advances …, 2014 - ieeexplore.ieee.org
Analysing cyber attack environments yield tremendous insight into adversory behavior, their
strategy and capabilities. Designing cyber intensive games that promote offensive and …