Towards a data-driven recommender system for handling ransomware and similar incidents
M Husák - 2021 IEEE International Conference on Intelligence …, 2021 - ieeexplore.ieee.org
Effective triage is of utmost importance for cybersecurity incident response, namely in
handling ransomware or similar incidents in which the attacker may use self-propagating …
handling ransomware or similar incidents in which the attacker may use self-propagating …
Assessing a decision support tool for SOC analysts
J Happa, I Agrafiotis, M Helmhout… - … Threats: Research and …, 2021 - dl.acm.org
It is difficult to discern real-world consequences of attacks on an enterprise when
investigating network-centric data alone. In recent years, many tools have been developed …
investigating network-centric data alone. In recent years, many tools have been developed …
Trade: Trusted anonymous data exchange: Threat sharing using blockchain technology
Cyber attacks are becoming more frequent and sophisticated, introducing significant
challenges for organizations to protect their systems and data from threat actors. Today …
challenges for organizations to protect their systems and data from threat actors. Today …
Cybersecurity, computer networks phishing, malware, ransomware, and social engineering anti-piracy reviews
MÖ Başeskioğlu, A Tepecik - 2021 3rd International Congress …, 2021 - ieeexplore.ieee.org
With the rapid development of technology, connection to the internet is an indispensable
element of life. With the Covid-19 Pandemic outbreak, online education with a computer and …
element of life. With the Covid-19 Pandemic outbreak, online education with a computer and …
Directional laplacian centrality for cyber situational awareness
Cyber operations is drowning in diverse, high-volume, multi-source data. To get a full picture
of current operations and identify malicious events and actors, analysts must see through …
of current operations and identify malicious events and actors, analysts must see through …
Self-aware effective identification and response to viral cyber threats
Artificial intelligence (AI) techniques can significantly improve cyber security operations if
tasks and responsibilities are effectively shared between human and machine. AI …
tasks and responsibilities are effectively shared between human and machine. AI …
System for continuous collection of contextual information for network security management and incident handling
In this paper, we describe a system for the continuous collection of data for the needs of
network security management. When a cybersecurity incident occurs in the network, the …
network security management. When a cybersecurity incident occurs in the network, the …
Modelling Disruptive APTs targeting Critical Infrastructure using Military Theory
Y Meijaard, PP Meiler, L Allodi - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
Disruptive Advanced Persistent Threats (D-APTs) are a new sophisticated class of
cyberattacks targeting critical infrastructures. Whereas regular APTs are well-described in …
cyberattacks targeting critical infrastructures. Whereas regular APTs are well-described in …
[PDF][PDF] Lessons learned while supporting Cyber Situational Awareness.
G Blasilli, E De Paoli, S Lenti, S Picca - EuroVA@ EuroVis, 2021 - diglib.eg.org
The increasing number of cyberattacks against critical infrastructures has pushed
researchers to develop many Visual Analytics solutions to provide valid defensive …
researchers to develop many Visual Analytics solutions to provide valid defensive …
[PDF][PDF] Detecting False Data Injection Attacks Against Smart Grid Wide Area Monitoring Systems
S Paudel - 2021 - academia.edu
Wide area monitoring systems (WAMSs) are used to measure synchrophasor data at
different locations and give operators a near-real-time picture of what is happening in the …
different locations and give operators a near-real-time picture of what is happening in the …