Security operations center: A systematic study and open challenges

M Vielberth, F Böhm, I Fichtinger, G Pernul - Ieee Access, 2020 - ieeexplore.ieee.org
Since the introduction of Security Operations Centers (SOCs) around 15 years ago, their
importance has grown significantly, especially over the last five years. This is mainly due to …

A systematic mapping study on intrusion alert analysis in intrusion detection systems

AA Ramaki, A Rasoolzadegan, AG Bafghi - ACM computing surveys …, 2018 - dl.acm.org
Intrusion alert analysis is an attractive and active topic in the area of intrusion detection
systems. In recent decades, many research communities have been working in this field …

Captain: community-based advanced persistent threat analysis in it networks

AA Ramaki, A Ghaemi-Bafghi… - International Journal of …, 2023 - Elsevier
Organizations that possess valuable information assets and critical infrastructure are prone
to Advanced Persistent Threats (APTs). The life cycle of this type of modern attack consists of …

Agent-based approach to the design of a multimodal interface for cyber-security event visualisation control

W Kasprzak, W Szynkiewicz, M Stefańczyk… - Bulletin of the Polish …, 2020 - yadda.icm.edu.pl
Convenient human-computer interaction is essential to carry out many exhausting and
concentration-demanding activities. One of them is cyber-situational awareness as well as …

Utilisation of embodied agents in the design of smart human–computer interfaces—A Case Study in Cyberspace Event Visualisation Control

W Szynkiewicz, W Kasprzak, C Zieliński, W Dudek… - Electronics, 2020 - mdpi.com
The goal of the research reported here was to investigate whether the design methodology
utilising embodied agents can be applied to produce a multi-modal human–computer …

[PDF][PDF] Interactive visualization of event logs for cybersecurity

BCM Cappers - 2018 - research.tue.nl
I remember the day well when I entered Jack'so ce four years ago. As a Master student in
Software Engineering I was looking for a supervisor in visualization to support me in the …

Designing a Vulnerability Management Dashboard to Enhance Security Analysts' Decision Making Processes

D Manatova, I Kouper, S Samtani - Practice and Experience in Advanced …, 2022 - dl.acm.org
Network vulnerability management reduces threats posed by weaknesses in software,
hardware, or organizational practices. As networks and related threats grow in size and …

[PDF][PDF] Hack the Bank and Best Practices for Secure Bank

TT Mapoka, K Zuva, T Zuva - International Journal of Computer …, 2019 - academia.edu
Financial institutions are tremendous targets of opportunity for electronic thievery.
Intermingled threats, improvements to man-in-the-middle or browser exploits, and advances …

[PDF][PDF] Agentowa struktura wielomodalnego interfejsu do Narodowej Platformy Cyberbezpieczeństwa, część 1

W Kasprzak, W Szynkiewicz… - Pomiary Automatyka …, 2019 - bibliotekanauki.pl
Ten dwuczęściowy artykuł przedstawia interfejs do Narodowej Platformy
Cyberbezpieczeństwa (NPC). Wykorzystuje on gesty i komendy wydawane głosem do …

Research on Computer Large-screen Information System and System Software Operating Mechanism of Gymnasiums

X Zheng - 2021 IEEE International Conference on Advances in …, 2021 - ieeexplore.ieee.org
The paper presents the overall design scheme of the large-screen display and monitoring
system for sports competition venues. The event system adopts the C/S structure mode, and …