A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing
F Skopik, G Settanni, R Fiedler - Computers & Security, 2016 - Elsevier
The Internet threat landscape is fundamentally changing. A major shift away from hobby
hacking toward well-organized cyber crime can be observed. These attacks are typically …
hacking toward well-organized cyber crime can be observed. These attacks are typically …
Towards automated cyber decision support: A case study on network segmentation for security
Network segmentation is a security measure that partitions a network into sections or
segments to restrict the movement of a cyber attacker and make it difficult for her to gain …
segments to restrict the movement of a cyber attacker and make it difficult for her to gain …
[HTML][HTML] A network security situation prediction model based on wavelet neural network with optimized parameters
H Zhang, Q Huang, F Li, J Zhu - Digital Communications and Networks, 2016 - Elsevier
The security incidents ion networks are sudden and uncertain, it is very hard to precisely
predict the network security situation by traditional methods. In order to improve the …
predict the network security situation by traditional methods. In order to improve the …
Queryable semantics to detect cyber-attacks: A flow-based detection approach
AF AlEroud, G Karabatis - IEEE transactions on systems, man …, 2016 - ieeexplore.ieee.org
Cyber-attacks continue to increase worldwide, leading to significant loss or misuse of
information assets. Most of the existing intrusion detection systems rely on per-packet …
information assets. Most of the existing intrusion detection systems rely on per-packet …
Data integrity attacks in smart grid wide area monitoring
A smart grid requires the implementation of ICT technologies in order to incorporate new
functions into electricity grid monitoring and control. Wide Area Monitoring Systems …
functions into electricity grid monitoring and control. Wide Area Monitoring Systems …
Csc-detector: A system to infer large-scale probing campaigns
This paper uniquely leverages unsolicited real darknet data to propose a novel system, CSC-
Detector, that aims at identifying Cyber Scanning Campaigns. The latter define a new …
Detector, that aims at identifying Cyber Scanning Campaigns. The latter define a new …
Effective prioritization of network intrusion alerts to enhance situational awareness
EA Newcomb, RJ Hammell… - 2016 IEEE Conference …, 2016 - ieeexplore.ieee.org
Maintaining situational awareness in dynamic and complex systems, such as information
and communications networks, is essential to protecting assets and increasing mission …
and communications networks, is essential to protecting assets and increasing mission …
Role of intrusion-detection systems in cyber-attack detection
V Dutt, F Moisan, C Gonzalez - … in Cybersecurity: Proceedings of the AHFE …, 2016 - Springer
Currently, little is known about how defenders' reliance on decision-support technology
influences their decisions. Here, we designed a cyber-security game, where “hackers” …
influences their decisions. Here, we designed a cyber-security game, where “hackers” …
Survey of network security situation awareness
龚俭, 臧小东, 苏琪, 胡晓艳, 徐杰 - Journal of Software, 2016 - jos.org.cn
随着网络空间安全重要性的不断提高, 网络安全态势感知 (network security situation
awareness, 简称 NSSA) 的研究与应用正在得到更多的关注. NSSA 实现对网络中各种活动的 …
awareness, 简称 NSSA) 的研究与应用正在得到更多的关注. NSSA 实现对网络中各种活动的 …
Hierarchical clustering of group behaviors in cyber situation awareness
Y Zhang, L Liao, C Xu, M Yang - 2016 IEEE International …, 2016 - ieeexplore.ieee.org
In cyber situation awareness, top-down simulation for group behaviors of attacks are
unsupported to simulate unknown cliques of attackers. To solve this issue, we believe that …
unsupported to simulate unknown cliques of attackers. To solve this issue, we believe that …