Towards a data-driven recommender system for handling ransomware and similar incidents

M Husák - 2021 IEEE International Conference on Intelligence …, 2021 - ieeexplore.ieee.org
Effective triage is of utmost importance for cybersecurity incident response, namely in
handling ransomware or similar incidents in which the attacker may use self-propagating …

Assessing a decision support tool for SOC analysts

J Happa, I Agrafiotis, M Helmhout… - … Threats: Research and …, 2021 - dl.acm.org
It is difficult to discern real-world consequences of attacks on an enterprise when
investigating network-centric data alone. In recent years, many tools have been developed …

Trade: Trusted anonymous data exchange: Threat sharing using blockchain technology

Y Allouche, N Tapas, F Longo, A Shabtai… - arXiv preprint arXiv …, 2021 - arxiv.org
Cyber attacks are becoming more frequent and sophisticated, introducing significant
challenges for organizations to protect their systems and data from threat actors. Today …

Cybersecurity, computer networks phishing, malware, ransomware, and social engineering anti-piracy reviews

MÖ Başeskioğlu, A Tepecik - 2021 3rd International Congress …, 2021 - ieeexplore.ieee.org
With the rapid development of technology, connection to the internet is an indispensable
element of life. With the Covid-19 Pandemic outbreak, online education with a computer and …

Directional laplacian centrality for cyber situational awareness

SG Aksoy, E Purvine, SJ Young - Digital Threats: Research and Practice …, 2021 - dl.acm.org
Cyber operations is drowning in diverse, high-volume, multi-source data. To get a full picture
of current operations and identify malicious events and actors, analysts must see through …

Self-aware effective identification and response to viral cyber threats

P Baroni, F Cerutti, D Fogli, M Giacomin… - … on Cyber Conflict …, 2021 - ieeexplore.ieee.org
Artificial intelligence (AI) techniques can significantly improve cyber security operations if
tasks and responsibilities are effectively shared between human and machine. AI …

System for continuous collection of contextual information for network security management and incident handling

M Husák, M Laštovička, D Tovarňák - Proceedings of the 16th …, 2021 - dl.acm.org
In this paper, we describe a system for the continuous collection of data for the needs of
network security management. When a cybersecurity incident occurs in the network, the …

Modelling Disruptive APTs targeting Critical Infrastructure using Military Theory

Y Meijaard, PP Meiler, L Allodi - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
Disruptive Advanced Persistent Threats (D-APTs) are a new sophisticated class of
cyberattacks targeting critical infrastructures. Whereas regular APTs are well-described in …

[PDF][PDF] Lessons learned while supporting Cyber Situational Awareness.

G Blasilli, E De Paoli, S Lenti, S Picca - EuroVA@ EuroVis, 2021 - diglib.eg.org
The increasing number of cyberattacks against critical infrastructures has pushed
researchers to develop many Visual Analytics solutions to provide valid defensive …

[PDF][PDF] Detecting False Data Injection Attacks Against Smart Grid Wide Area Monitoring Systems

S Paudel - 2021 - academia.edu
Wide area monitoring systems (WAMSs) are used to measure synchrophasor data at
different locations and give operators a near-real-time picture of what is happening in the …