Survey of attack projection, prediction, and forecasting in cyber security
This paper provides a survey of prediction, and forecasting methods used in cyber security.
Four main tasks are discussed first, attack projection and intention recognition, in which …
Four main tasks are discussed first, attack projection and intention recognition, in which …
The future cybersecurity workforce: Going beyond technical skills for successful cyber performance
One of the challenges in writing an article reviewing the current state of cyber education and
workforce development is that there is a paucity of quantitative assessment regarding the …
workforce development is that there is a paucity of quantitative assessment regarding the …
A cyber security data triage operation retrieval system
Data triage is a fundamental stage of cyber defense analysis for achieving cyber situational
awareness in a Security Operations Center (SOC). It has a high requirement for cyber …
awareness in a Security Operations Center (SOC). It has a high requirement for cyber …
Simulations in cyber-security: a review of cognitive modeling of network attackers, defenders, and users
VD Veksler, N Buchler, BE Hoffman… - Frontiers in …, 2018 - frontiersin.org
Computational models of cognitive processes may be employed in cyber-security tools,
experiments, and simulations to address human agency and effective decision-making in …
experiments, and simulations to address human agency and effective decision-making in …
Predicting cyber-events by leveraging hacker sentiment
Recent high-profile cyber-attacks exemplify why organizations need better cyber-defenses.
Cyber-threats are hard to accurately predict because attackers usually try to mask their …
Cyber-threats are hard to accurately predict because attackers usually try to mask their …
Human factors in streaming data analysis: Challenges and opportunities for information visualization
Real‐world systems change continuously. In domains such as traffic monitoring or cyber
security, such changes occur within short time scales. This results in a streaming data …
security, such changes occur within short time scales. This results in a streaming data …
CRUSOE: Data model for cyber situational awareness
Attaining and keeping cyber situational awareness is crucial for the proper incident
response, especially in critical infrastructures. Incident handlers need to process …
response, especially in critical infrastructures. Incident handlers need to process …
A graphical model to assess the impact of multi-step attacks
M Albanese, S Jajodia - The Journal of Defense Modeling …, 2018 - journals.sagepub.com
In the last several decades, networked systems have grown in complexity and
sophistication, introducing complex interdependencies amongst their numerous and diverse …
sophistication, introducing complex interdependencies amongst their numerous and diverse …
Sonification of network traffic flow for monitoring and situational awareness
M Debashi, P Vickers - PloS one, 2018 - journals.plos.org
Maintaining situational awareness of what is happening within a computer network is
challenging, not only because the behaviour happens within machines, but also because …
challenging, not only because the behaviour happens within machines, but also because …
Towards provable network traffic measurement and analysis via semi-labeled trace datasets
Research in network traffic measurement and analysis is a long-lasting field with growing
interest from both scientists and the industry. However, even after so many years, results …
interest from both scientists and the industry. However, even after so many years, results …