Cyber situational awareness–a systematic review of the literature
U Franke, J Brynielsson - Computers & security, 2014 - Elsevier
Cyber situational awareness is attracting much attention. It features prominently in the
national cyber strategies of many countries, and there is a considerable body of research …
national cyber strategies of many countries, and there is a considerable body of research …
On fingerprinting probing activities
Motivated by recent cyber attacks that were facilitated through probing, limited cyber security
intelligence and the lack of accuracy that is provided by scanning detection systems, this …
intelligence and the lack of accuracy that is provided by scanning detection systems, this …
Cognition and technology
As the previous chapters emphasized, the human cognition—and the technology necessary
to support it—are central to Cyber Situational Awareness. Therefore, this chapter focuses on …
to support it—are central to Cyber Situational Awareness. Therefore, this chapter focuses on …
Sonification aesthetics and listening for network situational awareness
This paper looks at the problem of using sonification to enable network administrators to
maintaining situational awareness about their network environment. Network environments …
maintaining situational awareness about their network environment. Network environments …
Network resilience with reusable management patterns
Troubleshooting of problems, such as attacks and misconfigurations, and ensuring the
resilience of networks is a significant issue for network operators. It increasingly requires the …
resilience of networks is a significant issue for network operators. It increasingly requires the …
Beyond technical data-a more comprehensive situational awareness fed by available intelligence information
A Kornmaier, F Jaouën - 2014 6th International Conference On …, 2014 - ieeexplore.ieee.org
Information on cyber incidents and threats are currently collected and processed with a
strong technical focus. Threat and vulnerability information alone are not a solid base for …
strong technical focus. Threat and vulnerability information alone are not a solid base for …
Attack visualisation for cyber-security situation awareness
M Evangelopoulou, CW Johnson - 2014 - IET
This paper illustrates how Situation Awareness measurement techniques can be transferred
and adopted to a Cloud Computing network environment, specifically concerning the …
and adopted to a Cloud Computing network environment, specifically concerning the …
Mr-triage: Scalable multi-criteria clustering for big data security intelligence applications
Y Shen, O Thonnard - … Conference on Big Data (Big Data), 2014 - ieeexplore.ieee.org
Security companies have recently realised that mining massive amounts of security data can
help generate actionable intelligence and improve their understanding of Internet attacks. In …
help generate actionable intelligence and improve their understanding of Internet attacks. In …
A method of network security situation prediction based on AC-RBF neural network.
LI Fangwei, Z Bo, ZHU Jiang… - Journal of Chongqing …, 2014 - search.ebscohost.com
To grasp the trend of network security, a method of network security situation prediction
(NSSP) based on adaptive clustering radical basis function (AC-RBF) neural network is …
(NSSP) based on adaptive clustering radical basis function (AC-RBF) neural network is …
Synthesizing perception based on analysis of cyber attack environments
S Sunny, V Pavithran… - … Conference on Advances …, 2014 - ieeexplore.ieee.org
Analysing cyber attack environments yield tremendous insight into adversory behavior, their
strategy and capabilities. Designing cyber intensive games that promote offensive and …
strategy and capabilities. Designing cyber intensive games that promote offensive and …