Survey of attack projection, prediction, and forecasting in cyber security

M Husák, J Komárková, E Bou-Harb… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
This paper provides a survey of prediction, and forecasting methods used in cyber security.
Four main tasks are discussed first, attack projection and intention recognition, in which …

The future cybersecurity workforce: Going beyond technical skills for successful cyber performance

J Dawson, R Thomson - Frontiers in psychology, 2018 - frontiersin.org
One of the challenges in writing an article reviewing the current state of cyber education and
workforce development is that there is a paucity of quantitative assessment regarding the …

A cyber security data triage operation retrieval system

C Zhong, T Lin, P Liu, J Yen, K Chen - Computers & Security, 2018 - Elsevier
Data triage is a fundamental stage of cyber defense analysis for achieving cyber situational
awareness in a Security Operations Center (SOC). It has a high requirement for cyber …

Simulations in cyber-security: a review of cognitive modeling of network attackers, defenders, and users

VD Veksler, N Buchler, BE Hoffman… - Frontiers in …, 2018 - frontiersin.org
Computational models of cognitive processes may be employed in cyber-security tools,
experiments, and simulations to address human agency and effective decision-making in …

Predicting cyber-events by leveraging hacker sentiment

A Deb, K Lerman, E Ferrara - Information, 2018 - mdpi.com
Recent high-profile cyber-attacks exemplify why organizations need better cyber-defenses.
Cyber-threats are hard to accurately predict because attackers usually try to mask their …

Human factors in streaming data analysis: Challenges and opportunities for information visualization

A Dasgupta, DL Arendt, LR Franklin… - Computer graphics …, 2018 - Wiley Online Library
Real‐world systems change continuously. In domains such as traffic monitoring or cyber
security, such changes occur within short time scales. This results in a streaming data …

CRUSOE: Data model for cyber situational awareness

J Komárková, M Husák, M Laštovička… - Proceedings of the 13th …, 2018 - dl.acm.org
Attaining and keeping cyber situational awareness is crucial for the proper incident
response, especially in critical infrastructures. Incident handlers need to process …

A graphical model to assess the impact of multi-step attacks

M Albanese, S Jajodia - The Journal of Defense Modeling …, 2018 - journals.sagepub.com
In the last several decades, networked systems have grown in complexity and
sophistication, introducing complex interdependencies amongst their numerous and diverse …

Sonification of network traffic flow for monitoring and situational awareness

M Debashi, P Vickers - PloS one, 2018 - journals.plos.org
Maintaining situational awareness of what is happening within a computer network is
challenging, not only because the behaviour happens within machines, but also because …

Towards provable network traffic measurement and analysis via semi-labeled trace datasets

M Cermak, T Jirsik, P Velan… - 2018 Network Traffic …, 2018 - ieeexplore.ieee.org
Research in network traffic measurement and analysis is a long-lasting field with growing
interest from both scientists and the industry. However, even after so many years, results …