Analysis framework of network security situational awareness and comparison of implementation methods
Y Li, G Huang, C Wang, Y Li - EURASIP Journal on Wireless …, 2019 - Springer
Abstract Information technology has penetrated into all aspects of politics, economy, and
culture of the whole society. The information revolution has changed the way of …
culture of the whole society. The information revolution has changed the way of …
Sonification Design
D Worrall - Cham: Springer, 2019 - Springer
One task of data sonification is to provide a means by which listeners can obtain new ideas
about the nature of the source of derived data. In so doing they can increase their …
about the nature of the source of derived data. In so doing they can increase their …
Utilising experiential and organizational learning theories to improve human performance in cyber training
K Aaltola, P Taitto - 2019 - theseus.fi
Development of information technology and the globalization require constant investment in
people. New and emerging technologies such as autonomous sys-tems, machine learning …
people. New and emerging technologies such as autonomous sys-tems, machine learning …
Threat intelligence platform for the energy sector
R Leszczyna, MR Wróbel - Software: Practice and Experience, 2019 - Wiley Online Library
In recent years, critical infrastructures and power systems in particular have been subjected
to sophisticated cyberthreats, including targeted attacks and advanced persistent threats. A …
to sophisticated cyberthreats, including targeted attacks and advanced persistent threats. A …
A data-analytics approach for enterprise resilience
Enterprise resilience plays an important role to prevent business services from disruptions
caused by human-induced disasters such as failed change implementations and software …
caused by human-induced disasters such as failed change implementations and software …
Decision support for mission-centric cyber defence
In this paper, we propose a novel approach to enterprise mission modeling and mission-
centric decision support for cybersecurity operations. The goal of the decision support …
centric decision support for cybersecurity operations. The goal of the decision support …
Cyber Situation Awareness via IP Flow Monitoring
T Jirsík - 2019 - is.muni.cz
Anotace Tato dizertační práce vylepšuje možnosti situačního povědomí v kybernetické
bezpečností výzkumem nových metod pro vnímání a porozumění počítačových sítí. V rámci …
bezpečností výzkumem nových metod pro vnímání a porozumění počítačových sítí. V rámci …
Systems Engineering Approaches
DJ Bodeau, RD Graubart - Cyber Resilience of Systems and Networks, 2019 - Springer
Suppose you assessed or analyzed the resilience of a system using approaches described
in Part II of this book or similar approaches. Chances are, you determined that the resilience …
in Part II of this book or similar approaches. Chances are, you determined that the resilience …
Polymedia design for network metadata monitoring
D Worrall, D Worrall - Sonification Design: From Data to Intelligible …, 2019 - Springer
The design of a realtime monitor for an organization's digital network can produce several
significant design challenges, both from the technical and human operational perspectives …
significant design challenges, both from the technical and human operational perspectives …
Can Intelligent Agent Improve Human-Machine Team Performance Under Cyberattacks?
W Ding, S Kim, D Xu, I Kim - … Systems Integration 2019: Proceedings of the …, 2019 - Springer
This paper presents a preliminary work of a simulation study for the evaluation of human-
machine team (HMT) performance with assistance of a sentinel system under cyberattacks …
machine team (HMT) performance with assistance of a sentinel system under cyberattacks …